uting program 0: r0 = syz_open_dev$loop(0x0, 0x1, 0x2000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:26:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x6, 0x50001) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) (async) pidfd_getfd(0xffffffffffffffff, r0, 0x0) (async, rerun: 64) r1 = socket$qrtr(0x2a, 0x2, 0x0) (rerun: 64) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) 22:26:54 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:54 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) socket(0x15, 0x4, 0x4b) 22:26:54 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:54 executing program 0: r0 = syz_open_dev$loop(0x0, 0x1, 0x2000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:26:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x6, 0x50001) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) (async) pidfd_getfd(0xffffffffffffffff, r0, 0x0) (async) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) 22:26:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x1e, 0x1, "4a23daff48263a60f986b135b771b7596a447c6acc2a8aa82f12dea7eac44ba0be66c60a37b205b2777b8a1638c2a6bdbe2894154bf39ea907b5cf9b2160f582", "703a56e83672e23ae2ea3b9fecc9b0308426f7ef1c58af690980d14afa20d549", [0x7fffffff, 0x10001]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000000)={r0, 0xfffffff7, {0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0xa, 0x7, 0x1, "8030f04bdfe4298136f836f6953dfb7a2842a0a0ffb9d4f52c09a083c3d2369891990500000000000000039bd17eba9d32b1fc86b3bb25663a19b0f2feeae23f", "4102bc70a2cb9cf18fe7cf57d83f02000000e588c3739a09ff81ebb985a82d0e2a9b10f7b06a938575fd2d60bce9e1600d82b74eca8bbeefbff37c3deea42ddc", "5cecb5be8e4c22fc896f8dfad00ffd87eb317485b0e019a0e2d5aeafdbfd80d4", [0x8000000000000001, 0x2]}}) recvfrom$llc(r1, &(0x7f0000000240)=""/235, 0xeb, 0x100, &(0x7f0000000340)={0x1a, 0x1, 0x81, 0x9e, 0xff, 0x40, @broadcast}, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) write$P9_RFSYNC(r3, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) 22:26:54 executing program 0: r0 = syz_open_dev$loop(0x0, 0x1, 0x2000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:26:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (async) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x1e, 0x1, "4a23daff48263a60f986b135b771b7596a447c6acc2a8aa82f12dea7eac44ba0be66c60a37b205b2777b8a1638c2a6bdbe2894154bf39ea907b5cf9b2160f582", "703a56e83672e23ae2ea3b9fecc9b0308426f7ef1c58af690980d14afa20d549", [0x7fffffff, 0x10001]}) (async) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000000)={r0, 0xfffffff7, {0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0xa, 0x7, 0x1, "8030f04bdfe4298136f836f6953dfb7a2842a0a0ffb9d4f52c09a083c3d2369891990500000000000000039bd17eba9d32b1fc86b3bb25663a19b0f2feeae23f", "4102bc70a2cb9cf18fe7cf57d83f02000000e588c3739a09ff81ebb985a82d0e2a9b10f7b06a938575fd2d60bce9e1600d82b74eca8bbeefbff37c3deea42ddc", "5cecb5be8e4c22fc896f8dfad00ffd87eb317485b0e019a0e2d5aeafdbfd80d4", [0x8000000000000001, 0x2]}}) (async) recvfrom$llc(r1, &(0x7f0000000240)=""/235, 0xeb, 0x100, &(0x7f0000000340)={0x1a, 0x1, 0x81, 0x9e, 0xff, 0x40, @broadcast}, 0x10) (async) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) (async) write$P9_RFSYNC(r3, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) 22:26:54 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540), 0x0, 0x2000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:26:55 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (rerun: 64) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x1e, 0x1, "4a23daff48263a60f986b135b771b7596a447c6acc2a8aa82f12dea7eac44ba0be66c60a37b205b2777b8a1638c2a6bdbe2894154bf39ea907b5cf9b2160f582", "703a56e83672e23ae2ea3b9fecc9b0308426f7ef1c58af690980d14afa20d549", [0x7fffffff, 0x10001]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000000)={r0, 0xfffffff7, {0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0xa, 0x7, 0x1, "8030f04bdfe4298136f836f6953dfb7a2842a0a0ffb9d4f52c09a083c3d2369891990500000000000000039bd17eba9d32b1fc86b3bb25663a19b0f2feeae23f", "4102bc70a2cb9cf18fe7cf57d83f02000000e588c3739a09ff81ebb985a82d0e2a9b10f7b06a938575fd2d60bce9e1600d82b74eca8bbeefbff37c3deea42ddc", "5cecb5be8e4c22fc896f8dfad00ffd87eb317485b0e019a0e2d5aeafdbfd80d4", [0x8000000000000001, 0x2]}}) recvfrom$llc(r1, &(0x7f0000000240)=""/235, 0xeb, 0x100, &(0x7f0000000340)={0x1a, 0x1, 0x81, 0x9e, 0xff, 0x40, @broadcast}, 0x10) (async, rerun: 32) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (rerun: 32) write$P9_RREADDIR(r3, 0x0, 0x0) write$P9_RFSYNC(r3, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) 22:26:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:26:55 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:55 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:55 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket(0x15, 0x4, 0x4b) 22:26:55 executing program 0: syz_open_dev$loop(&(0x7f0000000540), 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 22:26:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:55 executing program 0: syz_open_dev$loop(&(0x7f0000000540), 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 22:26:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:55 executing program 0: syz_open_dev$loop(&(0x7f0000000540), 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 22:26:55 executing program 3: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) (async) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:56 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:56 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:56 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:56 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:56 executing program 2: socket(0x15, 0x4, 0x4b) 22:26:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) (async, rerun: 64) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (rerun: 64) write$P9_RREADDIR(r1, 0x0, 0x0) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) 22:26:56 executing program 2: socket(0x0, 0x4, 0x4b) 22:26:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x88202, 0x4) name_to_handle_at(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000080), 0x1600) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x488480, 0xa) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x239) 22:26:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (async) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x88202, 0x4) name_to_handle_at(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000080), 0x1600) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x488480, 0xa) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x239) 22:26:56 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:57 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x46886f7e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) (async) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x88202, 0x4) name_to_handle_at(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000080), 0x1600) (async) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x488480, 0xa) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x239) 22:26:57 executing program 2: socket(0x0, 0x4, 0x4b) 22:26:57 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:26:57 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:57 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:57 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:26:57 executing program 2: socket(0x0, 0x4, 0x4b) 22:26:57 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:26:57 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:58 executing program 2: socket(0x15, 0x0, 0x4b) 22:26:58 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:58 executing program 2: socket(0x15, 0x0, 0x0) 22:26:58 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:26:58 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:26:58 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) 22:26:58 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:58 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:26:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:26:59 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:26:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:03 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:03 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:03 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:03 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:03 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 22:27:04 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 22:27:04 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:04 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:05 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:05 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:05 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:05 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:05 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:06 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:06 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:06 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:06 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:06 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 22:27:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef}, 0x48) 22:27:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef}, 0x48) 22:27:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x5e01d890e7c782ef}, 0x48) 22:27:06 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:07 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) 22:27:07 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:07 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:07 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:07 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:07 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:10 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:10 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:27:11 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:11 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:11 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:11 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:27:11 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:11 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:11 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:11 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:12 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:12 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:12 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:27:12 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:12 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:13 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:13 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:13 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:14 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:14 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:16 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:16 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:16 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:17 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:17 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:17 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:17 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:17 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:17 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:18 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:18 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:20 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:21 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:21 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:21 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:21 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:21 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:21 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:27:22 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:22 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:23 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:23 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:23 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:23 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:23 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:23 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:23 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:25 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:25 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:25 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:25 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:25 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:25 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:26 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:27 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:27 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:27 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:27 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:28 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:28 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:28 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:30 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:30 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:31 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:31 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:31 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:31 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:31 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:33 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:33 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:33 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:34 executing program 4: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:34 executing program 4: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:35 executing program 4: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:35 executing program 4: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:35 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:38 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:38 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:38 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:38 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:39 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:39 executing program 4: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:40 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 4: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:40 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:41 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:41 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:41 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:41 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:41 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:41 executing program 3: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:42 executing program 3: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:42 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 3: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:43 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 3: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:44 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:44 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:44 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:44 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:45 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:45 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:47 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:47 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:47 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:48 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:48 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 3: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:49 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:50 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:50 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:50 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:50 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:50 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 3: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 0: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:52 executing program 2: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 2: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 0: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 2: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 0: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 2: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 0: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:52 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:52 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:53 executing program 2: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:53 executing program 1: syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:53 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:53 executing program 1: syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:53 executing program 1: syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:54 executing program 2: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:54 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:54 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 0: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 1: syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:57 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:27:57 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:57 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:58 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:58 executing program 0: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:58 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:01 executing program 1: syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:01 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:01 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 1: syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:01 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:02 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:02 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:02 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:03 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:03 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:04 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:04 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:04 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:05 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:05 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:07 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:07 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4", 0x23, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:07 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:08 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:08 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:08 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:09 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:09 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:12 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:12 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:12 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:12 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e", 0x35, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:12 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:12 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:13 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:13 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:13 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:14 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:14 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:14 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:14 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:14 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:14 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f", 0x3e, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:15 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:16 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:17 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:17 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:17 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:18 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:18 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:18 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:18 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:18 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:20 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:20 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348", 0x42, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:21 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:21 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:21 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:21 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:21 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:21 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:21 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:25 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:26 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:26 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:26 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d", 0x44, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:26 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:26 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:26 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 293.483750][ T7139] syz-executor.2 (7139) used greatest stack depth: 10728 bytes left 22:28:26 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:26 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:26 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:27 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:27 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:27 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:27 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:27 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:29 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:29 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:30 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:30 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:30 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d38", 0x45, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:30 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:31 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:32 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:33 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:33 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:33 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:33 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:33 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:33 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:34 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:34 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:34 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:34 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:35 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:35 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:35 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:38 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:38 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:38 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:39 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:39 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:39 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:39 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:41 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:41 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:42 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:42 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:43 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:43 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:43 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:43 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:43 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:44 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:46 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:47 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:48 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:48 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:48 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:48 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:48 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:48 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:49 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:50 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:50 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:50 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:50 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:50 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:51 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:53 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:53 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:53 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:53 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:53 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:53 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:54 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:54 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:54 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:55 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:56 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:57 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:57 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:57 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:28:57 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:57 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:57 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:28:59 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:28:59 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:00 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:00 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:00 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:00 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:00 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:01 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:01 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:01 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:03 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:03 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:03 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:04 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:05 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab924") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:05 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:05 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:05 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:06 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:06 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:06 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:06 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:07 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb9") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:07 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:08 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:08 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:08 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:08 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:08 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:08 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:09 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:09 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:10 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:10 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:10 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:10 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:10 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:11 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:11 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:11 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:12 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:12 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:13 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:13 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:14 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:14 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:14 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:17 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:17 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:17 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:17 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:17 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:17 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:18 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:18 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:18 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:18 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:18 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:18 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:21 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:21 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:22 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:22 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:22 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:23 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:23 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:23 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:23 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:23 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:23 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:23 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:24 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:24 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:24 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:24 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:25 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) [ 353.498220][ T8178] syz-executor.3 (8178) used greatest stack depth: 10552 bytes left 22:29:27 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:27 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:27 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:27 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:27 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:27 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:27 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:28 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:28 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:28 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:28 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:28 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:29 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:29 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:29 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:32 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:32 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:33 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:33 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:33 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:33 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:33 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r3 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r3, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:33 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:34 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:34 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:35 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:35 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:35 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:37 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:37 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:38 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:38 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:38 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:38 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:38 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:39 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:39 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:39 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:39 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:40 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:41 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:42 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:42 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:42 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:42 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:42 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:43 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:43 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:43 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:43 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:44 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:44 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:44 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:44 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:44 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:44 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:45 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:45 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:46 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:46 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:46 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:46 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:47 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:47 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:47 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:47 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x0, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:47 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:48 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:48 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:48 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:48 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:48 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:49 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:49 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:49 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:50 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:50 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:50 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:50 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:50 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:51 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:51 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x0, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:51 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:51 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:54 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) 22:29:54 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:54 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:54 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:54 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:55 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:56 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x0, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:56 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:56 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:56 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:56 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:57 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:57 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:59 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:59 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:59 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:59 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000), 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:59 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:29:59 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:29:59 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:00 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:00 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:30:00 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000), 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:00 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:00 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:01 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) 22:30:03 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000), 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) 22:30:03 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:03 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) 22:30:03 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) 22:30:04 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:04 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:30:04 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:05 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:05 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:05 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:05 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:05 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:06 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:06 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:07 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:07 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:08 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:08 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:30:08 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) 22:30:09 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:09 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:09 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) 22:30:10 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) 22:30:10 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:10 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:11 executing program 3: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:12 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:12 executing program 0: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) 22:30:13 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:13 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:14 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:14 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:14 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:14 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:15 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:15 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:16 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:18 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:18 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:18 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:18 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:19 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:19 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:19 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:19 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:30:19 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:19 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:19 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:19 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:20 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:20 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:30:20 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:20 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:21 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:23 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:23 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:30:23 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:23 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:23 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:23 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:24 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:24 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:24 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:24 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:24 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:24 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:24 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:25 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:25 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:25 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:25 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:25 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:25 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:27 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:27 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:28 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:28 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:29 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:29 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:29 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:29 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:29 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:30 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:30 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:30 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:30 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:34 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:34 executing program 5: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:34 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:34 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:34 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:34 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:35 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:35 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:35 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x0, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:35 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r4, 0x0, 0x0, 0x0) 22:30:35 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:35 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:36 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:36 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:37 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 22:30:37 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:37 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:38 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:38 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x0, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:38 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:38 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 22:30:38 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:38 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:39 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) r4 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 22:30:39 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:39 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:39 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:39 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:43 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) r4 = socket(0x15, 0x4, 0x4b) accept4$unix(r4, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:30:43 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:43 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:43 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:44 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:44 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:46 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:46 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:46 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:46 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:46 executing program 4: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:46 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:46 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:46 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:47 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:47 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:47 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:47 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:30:47 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:47 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:47 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:48 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:49 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r2 = socket(0x15, 0x4, 0x4b) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:49 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:49 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:49 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:49 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:49 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = socket(0x15, 0x4, 0x4b) accept4$unix(r2, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:51 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:51 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:51 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:52 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:52 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:53 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:53 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:53 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:54 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000), 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:54 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 1: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:55 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000), 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) socket$qrtr(0x2a, 0x2, 0x0) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:55 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:55 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:55 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) socket$qrtr(0x2a, 0x2, 0x0) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000), 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:55 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:56 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:56 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:56 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) socket$qrtr(0x2a, 0x2, 0x0) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 443.016222][ T9801] ================================================================== [ 443.024353][ T9801] BUG: KCSAN: data-race in __dput_to_list / link_path_walk [ 443.031583][ T9801] [ 443.033914][ T9801] write to 0xffff88811fcb8b40 of 4 bytes by task 3087 on cpu 0: [ 443.041552][ T9801] __dput_to_list+0xab/0x240 [ 443.046162][ T9801] shrink_dentry_list+0x196/0x380 [ 443.051209][ T9801] shrink_dcache_parent+0x44/0x1a0 [ 443.056334][ T9801] vfs_rmdir+0x283/0x2f0 [ 443.060602][ T9801] do_rmdir+0x194/0x310 [ 443.064774][ T9801] __x64_sys_unlinkat+0xa4/0xb0 [ 443.069656][ T9801] do_syscall_64+0x41/0xc0 [ 443.074092][ T9801] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 443.080024][ T9801] [ 443.082363][ T9801] read to 0xffff88811fcb8b40 of 4 bytes by task 9801 on cpu 1: [ 443.089919][ T9801] link_path_walk+0x32f/0x7e0 [ 443.094630][ T9801] __filename_parentat+0x13b/0x3c0 [ 443.099765][ T9801] do_unlinkat+0xa1/0x4f0 [ 443.104125][ T9801] do_coredump+0x152e/0x1890 [ 443.108742][ T9801] get_signal+0xd65/0xff0 [ 443.113098][ T9801] arch_do_signal_or_restart+0x89/0x2a0 [ 443.118661][ T9801] exit_to_user_mode_loop+0x6f/0xe0 [ 443.123909][ T9801] exit_to_user_mode_prepare+0x6c/0xb0 [ 443.129399][ T9801] irqentry_exit_to_user_mode+0x9/0x20 [ 443.134893][ T9801] irqentry_exit+0x12/0x40 [ 443.139344][ T9801] asm_exc_page_fault+0x26/0x30 [ 443.144222][ T9801] [ 443.146554][ T9801] value changed: 0x00280000 -> 0x00200100 [ 443.152277][ T9801] [ 443.154614][ T9801] Reported by Kernel Concurrency Sanitizer on: 22:30:56 executing program 2: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r0 = epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000300)={0x2000}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:56 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 443.160770][ T9801] CPU: 1 PID: 9801 Comm: syz-executor.4 Not tainted 6.5.0-rc6-syzkaller #0 [ 443.169367][ T9801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 443.180128][ T9801] ================================================================== 22:30:57 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:57 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:57 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:57 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:30:58 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:30:58 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r0 = socket(0x15, 0x4, 0x4b) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:31:00 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000300)={0x2000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) r1 = epoll_create1(0x80000) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000300)={0x2000}) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:31:00 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:31:00 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:31:00 executing program 5: r0 = syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:00 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:31:01 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:01 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:01 executing program 0: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) setsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:01 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, 0x0, &(0x7f0000000080)) 22:31:01 executing program 1: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0x46, &(0x7f0000000140), &(0x7f0000000180), 0x0) epoll_create1(0x80000) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, r2}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 22:31:01 executing program 3: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r5, 0x6b, 0x4, &(0x7f0000000040), 0x0) 22:31:01 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:01 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:02 executing program 4: syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:02 executing program 5: r0 = syz_clone(0x40200100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:03 executing program 4: syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:03 executing program 5: r0 = syz_clone(0x40200100, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000300)={0x2000}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x401}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:05 executing program 2: r0 = syz_clone(0x40200100, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = epoll_create1(0x80000) r3 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000300)={0x2000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x1ff, 0x2, 0x4, 0x5e01d890e7c782ef, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x401}) r5 = socket(0x15, 0x4, 0x4b) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$unix(r5, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:31:05 executing program 4: syz_clone(0x0, &(0x7f00000000c0)="6a096c6b4cbd6565ec148bc1059b0c82acca9357efae2447e14db8625043a9b8256bc4d514f6dcdda06048c0935ed9d568a26bce1e430a1bda3909d5583f413a2348242d3859", 0xffffffffffffffab, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="cdb45174ecdd1af3f172f4bd3c7185b6ac3b8c9ab9242f1c77ec6593a0cf4a0f889e3f295afe854b77a85d42966b20fbb915") socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'netdevsim0\x00'}) r1 = socket(0x15, 0x4, 0x4b) accept4$unix(r1, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4)