x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) r7 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r7, 0x45b37000) 05:45:01 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) 05:45:01 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) 05:45:01 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) 05:45:01 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r6 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r6, 0x10000000) r7 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r7, 0x10000000) setsockopt$inet6_group_source_req(r7, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r7, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r7) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000001d80)={&(0x7f0000001cc0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x24, r5, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x441) 05:45:01 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) r7 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r7, 0x45b37000) 05:45:01 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) 05:45:01 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) 05:45:01 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r6 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r6, 0x10000000) r7 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r7, 0x10000000) setsockopt$inet6_group_source_req(r7, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r7, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r7) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000001d80)={&(0x7f0000001cc0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x24, r5, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x441) 05:45:01 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) socket$inet_udp(0x2, 0x2, 0x0) 05:45:01 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) r7 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r7, 0x45b37000) 05:45:01 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) 05:45:01 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) 05:45:01 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:01 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 05:45:01 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) r7 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r7, 0x45b37000) 05:45:01 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_ext={0x1c, 0x8, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @ldst={0x1, 0x2, 0x2, 0x5, 0x5, 0xfffffffffffffff8}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}]}, &(0x7f0000000a00)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xd, 0x7fff, 0x7}, 0x10, 0x2b8b, r10, 0x4, &(0x7f0000000f00)=[r11, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x2, 0x3, 0xc, 0x2}, {0x3, 0x2, 0x2, 0xb}, {0x2, 0x3, 0x1, 0x3}, {0x3, 0x5, 0x6, 0x7}], 0x10, 0x6}, 0x90) socketpair(0xa, 0x5, 0x7, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r12, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x4c, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x81}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8000}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4001}, 0x24040880) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), r6) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001ac0)={0x10000, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x10}, 0xb26}}, {{0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}}}, 0x108) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r6, 0x45b37000) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000001980)={0xfff, {{0xa, 0x4e23, 0xffff99bc, @rand_addr=' \x01\x00', 0x20}}, {{0xa, 0x4e21, 0x27, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000001}}}, 0x108) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r6, 0x45b37000) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) r6 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, r6, 0x10000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_ext={0x1c, 0x8, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @ldst={0x1, 0x2, 0x2, 0x5, 0x5, 0xfffffffffffffff8}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}]}, &(0x7f0000000a00)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xd, 0x7fff, 0x7}, 0x10, 0x2b8b, r10, 0x4, &(0x7f0000000f00)=[r11, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x2, 0x3, 0xc, 0x2}, {0x3, 0x2, 0x2, 0xb}, {0x2, 0x3, 0x1, 0x3}, {0x3, 0x5, 0x6, 0x7}], 0x10, 0x6}, 0x90) socketpair(0xa, 0x5, 0x7, &(0x7f0000001040)) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x30, r5, 0x10000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) io_uring_setup(0x6d7d, &(0x7f0000001900)={0x0, 0xabcf, 0x0, 0x2, 0x11d}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_ext={0x1c, 0x8, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @ldst={0x1, 0x2, 0x2, 0x5, 0x5, 0xfffffffffffffff8}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}]}, &(0x7f0000000a00)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xd, 0x7fff, 0x7}, 0x10, 0x2b8b, r10, 0x4, &(0x7f0000000f00)=[r11, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x2, 0x3, 0xc, 0x2}, {0x3, 0x2, 0x2, 0xb}, {0x2, 0x3, 0x1, 0x3}, {0x3, 0x5, 0x6, 0x7}], 0x10, 0x6}, 0x90) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001840)={0x33, 0x14, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xa8}, @calipso={0x7, 0x40, {0x1, 0xe, 0x3, 0x100, [0x4, 0x1, 0x6, 0xfff, 0x8, 0x2, 0x6]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x8, [0x5]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x1, [0x4, 0x65e, 0x3, 0x8]}}]}, 0xb0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:02 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x5c, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x101}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x101}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8de}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10be}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x10000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xc3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4844}, 0x8800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:02 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) socket$inet_udp(0x2, 0x2, 0x0) 05:45:02 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:02 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_ext={0x1c, 0x8, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @ldst={0x1, 0x2, 0x2, 0x5, 0x5, 0xfffffffffffffff8}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}]}, &(0x7f0000000a00)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xd, 0x7fff, 0x7}, 0x10, 0x2b8b, r10, 0x4, &(0x7f0000000f00)=[r11, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x2, 0x3, 0xc, 0x2}, {0x3, 0x2, 0x2, 0xb}, {0x2, 0x3, 0x1, 0x3}, {0x3, 0x5, 0x6, 0x7}], 0x10, 0x6}, 0x90) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) syz_genetlink_get_family_id$l2tp(&(0x7f00000016c0), r1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, r4, 0x1b0eb000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) r5 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r5, 0x45b37000) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x5, 0x5}, 0x48) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000001580)={0x3ff, {{0xa, 0x4e21, 0x3, @empty, 0xffffff81}}, {{0xa, 0x4e23, 0xfffffeff, @loopback, 0xd7f3}}}, 0x108) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) r4 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r4, 0x45b37000) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r4, 0x45b37000) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) r4 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r4, 0x45b37000) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) socket$l2tp6(0xa, 0x2, 0x73) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) r9 = pidfd_getfd(r8, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, @ldst={0x2, 0x0, 0x2, 0x4, 0x2, 0x80}, @jmp={0x5, 0x0, 0xd, 0x1, 0xb, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r9}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0xfe, 0x3, 0xc, 0xff, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000c00)='GPL\x00', 0xfffffc01, 0x9c, &(0x7f0000000c40)=""/156, 0x41000, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000d00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[r5, r5, r8, r9], 0x0, 0x10, 0x2}, 0x90) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r3, 0x45b37000) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000001500)=@srh={0x5d04fd28b4c4add3, 0xc, 0x4, 0x6, 0x0, 0x60, 0x6, [@ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @local, @empty]}, 0x68) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)) r2 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r2, 0x45b37000) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) pidfd_getfd(0xffffffffffffffff, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:03 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x4c, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40850) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r2, 0x45b37000) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 4: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:03 executing program 5: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:03 executing program 4: socket(0x2, 0xa, 0x3ff) socket$inet_udp(0x2, 0x2, 0x0) 05:45:03 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r1, 0x45b37000) 05:45:03 executing program 5: socket(0x2, 0xa, 0x3ff) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:04 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'syztnl1\x00', &(0x7f0000001340)={'syztnl2\x00', r2, 0x8, 0x1, 0x5, 0x2d, {{0x11, 0x4, 0x2, 0x1, 0x44, 0x65, 0x0, 0x32, 0x2b, 0x0, @rand_addr=0x64010100, @multicast1, {[@end, @lsrr={0x83, 0xf, 0x63, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010102]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0x9, [{@local, 0xfffffffd}]}, @generic={0x7, 0xe, "42c60d6df22ebf89b38b7025"}]}}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:04 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:04 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000012c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:04 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) 05:45:04 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:04 executing program 0: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:04 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r1, 0x45b37000) 05:45:04 executing program 3: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r1, 0x45b37000) 05:45:04 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x2010, 0xffffffffffffffff, 0x10000000) 05:45:04 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:04 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$l2tp(r1, &(0x7f00000011c0)="8962f85999735a7250aa1edcc9629fc7e2e455e56aeba919a33c7673a15ca5f401cc74589ccae8186ebb9164763b52877812bff90e42e11d67aa9d6ca6c20a82c7e4f738388a15cd583ccde02813dc704812fa98ef412da0f494a819958c487a572ec5b608b24fb230f78057b08f1304e6a12db5b559cde5046429e71bf327f3d79d0e658cf38ec56ab4d2eee17132b1595419b706d0e6d10702ac9d6680b9a0b422515bb163329a992915bbf101d2a3416df26ace6a5c041eb0b0afba38dd3ff7843c83fcdbbc77e54ec5cc0d7979f90fcc4758bc3d6ec83eff855001d44273f220aa07da219d4848b88ee0678eb98e8dfd92", 0xf3, 0x20000081, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:04 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 05:45:04 executing program 0: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:04 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:04 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:04 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:04 executing program 3: socket(0x2, 0xa, 0x3ff) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r0, 0x45b37000) 05:45:04 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) pidfd_getfd(0xffffffffffffffff, r0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:04 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r0, 0x45b37000) 05:45:04 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) [ 47.211493][ T3296] syz-executor.1 (3296) used greatest stack depth: 10728 bytes left 05:45:04 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:04 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x45b37000) 05:45:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x45b37000) 05:45:05 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) setsockopt$MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e20, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffff}, {0xa, 0x4e24, 0x4, @loopback}, 0xffffffffffffffff, {[0x9, 0x2, 0x9, 0x200, 0x800, 0x9, 0x789, 0x4d]}}, 0x5c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:05 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:05 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x45b37000) 05:45:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r0, 0x45b37000) 05:45:05 executing program 2: r0 = socket(0x2, 0xa, 0x3ff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/174, 0xae, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:05 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:05 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:05 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, 0xffffffffffffffff, 0x45b37000) 05:45:05 executing program 2: socket(0x2, 0xa, 0x3ff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:05 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:05 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00', 0x0, 0x10}, 0x18) 05:45:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, 0xffffffffffffffff, 0x45b37000) 05:45:05 executing program 5: socket(0x0, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:05 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:05 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:05 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:05 executing program 5: socket(0x0, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, 0xffffffffffffffff, 0x45b37000) 05:45:05 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:05 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r0, 0x0) 05:45:05 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:05 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:05 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:05 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={0x0, 0x0, 0x10}, 0x18) 05:45:05 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:06 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 5: socket(0x0, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 05:45:06 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={0x0, 0x0, 0x10}, 0x18) 05:45:06 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:06 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={0x0, 0x0, 0x10}, 0x18) 05:45:06 executing program 5: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:06 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c80)=@generic={&(0x7f0000001c40)='./file0\x00'}, 0x18) 05:45:06 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 5: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 2: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:06 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:06 executing program 5: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 2: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 5: socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 2: socket(0x2, 0x0, 0x3ff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:06 executing program 2: socket(0x2, 0x0, 0x3ff) 05:45:06 executing program 5: socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:07 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:07 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:07 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:07 executing program 5: socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) 05:45:07 executing program 2: socket(0x0, 0x0, 0x3ff) 05:45:07 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:07 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:07 executing program 2: socket(0x0, 0x0, 0x3ff) 05:45:07 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:07 executing program 5: socket(0x2, 0xa, 0x3ff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 05:45:07 executing program 2: socket(0x0, 0x0, 0x3ff) 05:45:07 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:08 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:08 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:08 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:08 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:08 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:08 executing program 2: socket(0x2, 0x0, 0x0) 05:45:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) 05:45:08 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:08 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:08 executing program 2: socket(0x0, 0x0, 0x0) 05:45:08 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 2: socket(0x0, 0x0, 0x0) 05:45:09 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) 05:45:09 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:09 executing program 2: socket(0x0, 0x0, 0x0) 05:45:09 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) 05:45:09 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:09 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 05:45:09 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:09 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:09 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:10 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 05:45:10 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:10 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:10 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:10 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) 05:45:10 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:10 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:11 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:11 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:11 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:11 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:11 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:11 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:11 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:11 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:11 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:12 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:12 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:12 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:12 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:12 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:12 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:13 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:13 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:13 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:13 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:13 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:13 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:14 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:14 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:14 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:14 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:14 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:14 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:15 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:15 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:15 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:15 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:16 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:16 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:16 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:16 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:16 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:16 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:16 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:16 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:17 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:17 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:17 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:17 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:17 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:17 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:17 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:18 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:18 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:18 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:18 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:18 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) process_mrelease(0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:18 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:19 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:19 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:19 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:19 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:20 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:20 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:20 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:20 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:21 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:21 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:21 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:21 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:21 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:21 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:22 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:22 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:22 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:22 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:22 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:22 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:22 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:23 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:23 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:23 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:23 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:23 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:23 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:23 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:24 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:24 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:24 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:24 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:24 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:24 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:24 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:25 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:25 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:25 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:26 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:26 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:26 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:26 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:26 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:27 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:27 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:27 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:27 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:27 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:27 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:28 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:28 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:28 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:28 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:28 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:29 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:29 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:29 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:30 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:30 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:30 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:30 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 73.137780][ T4845] syz-executor.0 (4845) used greatest stack depth: 10608 bytes left 05:45:32 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:32 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:32 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:32 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:32 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:33 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:33 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:33 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:34 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:34 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:35 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:35 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:35 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:35 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:35 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:35 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:36 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:36 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:36 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:36 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:36 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:37 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:37 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:37 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:38 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:38 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:38 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:38 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:38 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:38 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 82.341741][ T4727] syz-executor.3 (4727) used greatest stack depth: 9928 bytes left 05:45:40 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:40 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:40 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:41 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:41 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:41 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:41 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:42 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:42 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:42 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:42 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:43 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:43 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x20080, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:43 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:43 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:44 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:44 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:44 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:45 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:45 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:45 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:45 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:45 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:45 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:47 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:47 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:47 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:47 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:47 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:48 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:48 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:49 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:49 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:50 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:50 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:50 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:51 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r5 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r5, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:51 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:51 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:51 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:52 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:52 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:52 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:53 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:53 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 95.752906][ T5340] cgroup: fork rejected by pids controller in /syz3 05:45:53 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:45:53 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:53 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:53 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:54 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:54 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:54 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:45:55 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:45:55 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:56 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:56 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:45:56 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:45:57 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r2, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:57 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:57 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r2, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:45:58 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:45:58 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:02 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:04 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r2, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:08 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:08 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:46:08 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:08 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:08 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:08 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r7, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:08 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:08 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:08 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:08 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) 05:46:09 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:09 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:10 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:10 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:10 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:10 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:10 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:10 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:10 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:10 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:10 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r3, r0, 0x0) 05:46:11 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:12 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:12 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:46:12 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:12 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r3, r0, 0x0) 05:46:12 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:12 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:12 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:13 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:46:13 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r3, r0, 0x0) 05:46:13 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:13 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:46:13 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:13 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:13 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:46:14 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:46:14 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:14 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:14 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:14 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:46:14 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:14 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x0, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:14 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") process_mrelease(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r4 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r4, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r5, 0x2, '\x00', 0x0, r2, 0x3, 0x3}, 0x48) 05:46:15 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:46:15 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) [ 118.451283][ T671] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.528214][ T671] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.603629][ T671] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.875198][ T671] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 119.128774][ T27] kauditd_printk_skb: 27 callbacks suppressed [ 119.128785][ T27] audit: type=1400 audit(1699681576.574:140): avc: denied { getattr } for pid=5618 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=368 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.178418][ T27] audit: type=1400 audit(1699681576.614:141): avc: denied { read } for pid=5620 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=368 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.200192][ T27] audit: type=1400 audit(1699681576.614:142): avc: denied { open } for pid=5620 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=368 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.295971][ T27] audit: type=1400 audit(1699681576.744:143): avc: denied { create } for pid=5616 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.318275][ T27] audit: type=1400 audit(1699681576.744:144): avc: denied { write } for pid=5616 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=2638 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.344291][ T27] audit: type=1400 audit(1699681576.744:145): avc: denied { append } for pid=5616 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=2638 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 119.515198][ T27] audit: type=1400 audit(1699681576.764:146): avc: denied { unlink } for pid=5631 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=2638 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 05:46:17 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:17 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) [ 119.950668][ T671] hsr_slave_0: left promiscuous mode [ 119.985360][ T671] hsr_slave_1: left promiscuous mode [ 120.026066][ T671] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 120.033468][ T671] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 120.125482][ T671] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 120.133036][ T671] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 120.195890][ T671] bridge_slave_1: left allmulticast mode [ 120.201614][ T671] bridge_slave_1: left promiscuous mode [ 120.207342][ T671] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.275103][ T671] bridge_slave_0: left allmulticast mode [ 120.280821][ T671] bridge_slave_0: left promiscuous mode [ 120.286584][ T671] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.418891][ T671] veth1_macvtap: left promiscuous mode [ 120.424474][ T671] veth0_macvtap: left promiscuous mode [ 120.430070][ T671] veth1_vlan: left promiscuous mode [ 120.435313][ T671] veth0_vlan: left promiscuous mode 05:46:17 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, 0xffffffffffffffff, 0x0) [ 120.886074][ T671] team0 (unregistering): Port device team_slave_1 removed [ 120.935557][ T671] team0 (unregistering): Port device team_slave_0 removed [ 120.968706][ T671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 120.980092][ T671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 121.089129][ T671] bond0 (unregistering): Released all slaves 05:46:18 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:18 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 121.876238][ T671] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.085226][ T671] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.147468][ T27] audit: type=1400 audit(1699681579.594:147): avc: denied { read } for pid=5723 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 122.168882][ T27] audit: type=1400 audit(1699681579.594:148): avc: denied { open } for pid=5723 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 122.307166][ T671] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:46:19 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 122.485264][ T671] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:46:20 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) [ 122.998285][ T5723] chnl_net:caif_netlink_parms(): no params data found [ 123.213777][ T5750] chnl_net:caif_netlink_parms(): no params data found [ 123.402451][ T5750] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.409577][ T5750] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.456346][ T5750] bridge_slave_0: entered allmulticast mode [ 123.462845][ T5750] bridge_slave_0: entered promiscuous mode [ 123.556415][ T5750] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.563489][ T5750] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.605924][ T5750] bridge_slave_1: entered allmulticast mode [ 123.615057][ T5750] bridge_slave_1: entered promiscuous mode [ 123.675242][ T5723] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.682301][ T5723] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.690908][ T5723] bridge_slave_0: entered allmulticast mode [ 123.705484][ T5723] bridge_slave_0: entered promiscuous mode [ 123.725393][ T5723] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.732489][ T5723] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.765204][ T5723] bridge_slave_1: entered allmulticast mode [ 123.779706][ T5723] bridge_slave_1: entered promiscuous mode [ 123.815099][ T5750] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 123.836069][ T5750] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 123.874078][ T5723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 123.920987][ T5750] team0: Port device team_slave_0 added [ 123.937228][ T5750] team0: Port device team_slave_1 added [ 123.966210][ T5723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 123.979627][ T671] hsr_slave_0: left promiscuous mode [ 123.996309][ T671] hsr_slave_1: left promiscuous mode [ 124.008909][ T671] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 124.016413][ T671] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 124.025544][ T671] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 124.032937][ T671] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 124.076681][ T671] bridge_slave_1: left allmulticast mode [ 124.082331][ T671] bridge_slave_1: left promiscuous mode [ 124.088288][ T671] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.122546][ T671] bridge_slave_0: left allmulticast mode [ 124.128330][ T671] bridge_slave_0: left promiscuous mode [ 124.134042][ T671] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.213766][ T671] veth1_macvtap: left promiscuous mode [ 124.219446][ T671] veth0_macvtap: left promiscuous mode [ 124.225005][ T671] veth1_vlan: left promiscuous mode [ 124.230260][ T671] veth0_vlan: left promiscuous mode [ 124.563813][ T671] team0 (unregistering): Port device team_slave_1 removed [ 124.579851][ T671] team0 (unregistering): Port device team_slave_0 removed [ 124.618854][ T671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 124.646198][ T671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 124.691832][ T671] bond0 (unregistering): Released all slaves [ 124.814679][ T5750] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 124.821660][ T5750] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.847685][ T5750] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 124.970587][ T5750] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 124.977585][ T5750] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.003639][ T5750] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.038360][ T5723] team0: Port device team_slave_0 added [ 125.044689][ T5723] team0: Port device team_slave_1 added [ 125.100062][ T5723] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.107100][ T5723] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.133384][ T5723] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.308102][ T5750] hsr_slave_0: entered promiscuous mode [ 125.314112][ T5750] hsr_slave_1: entered promiscuous mode [ 125.335308][ T5750] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 125.342860][ T5750] Cannot create hsr debugfs directory [ 125.348584][ T5723] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.355583][ T5723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.381469][ T5723] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.492933][ T5723] hsr_slave_0: entered promiscuous mode [ 125.505254][ T5723] hsr_slave_1: entered promiscuous mode [ 125.521431][ T5723] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 125.546035][ T5723] Cannot create hsr debugfs directory [ 126.290614][ T5750] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 126.373061][ T5750] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 126.387260][ T5750] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 126.407141][ T5750] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 126.598627][ T5750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.622369][ T5750] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.666946][ T3194] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.674012][ T3194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.707089][ T3194] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.714237][ T3194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.802681][ T5750] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 126.899623][ T5750] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.979440][ T5723] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 126.998959][ T5723] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 127.009855][ T5723] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 127.040999][ T5723] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 127.118254][ T5750] veth0_vlan: entered promiscuous mode [ 127.147915][ T5750] veth1_vlan: entered promiscuous mode [ 127.190215][ T5750] veth0_macvtap: entered promiscuous mode [ 127.207880][ T5750] veth1_macvtap: entered promiscuous mode [ 127.244146][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 127.254788][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.264667][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 127.275153][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.284991][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 127.295493][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.305414][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 127.315836][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.328903][ T5750] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 127.343425][ T5723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.369164][ T5723] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.388780][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 127.399358][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.409191][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 127.419725][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.429551][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 127.439987][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.449847][ T5750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 127.460347][ T5750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 127.474086][ T5750] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 127.488409][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.495484][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.506487][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.513545][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.532418][ T5723] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 127.542827][ T5723] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 127.559735][ T5750] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.568595][ T5750] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.577413][ T5750] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.586117][ T5750] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.712547][ T5723] 8021q: adding VLAN 0 to HW filter on device batadv0 05:46:25 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 127.880497][ T5723] veth0_vlan: entered promiscuous mode [ 127.942829][ T5723] veth1_vlan: entered promiscuous mode [ 127.973961][ T5723] veth0_macvtap: entered promiscuous mode [ 128.015263][ T5723] veth1_macvtap: entered promiscuous mode [ 128.065398][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 128.075899][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.085751][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 128.096412][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.106389][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 128.116802][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.126610][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 128.137065][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.146910][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 128.157336][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.273056][ T5723] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 128.295110][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 128.305619][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.315490][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 128.325899][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.335700][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 128.346136][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.355955][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 128.366426][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.376320][ T5723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 128.386857][ T5723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 128.511436][ T5723] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 128.547250][ T5723] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.556056][ T5723] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.564795][ T5723] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.573568][ T5723] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x0, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, 0xffffffffffffffff, 0x0) 05:46:26 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:26 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:26 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:26 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x0, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:26 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:26 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:27 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, 0xffffffffffffffff, 0x0) 05:46:27 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:28 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:28 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:46:28 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:46:28 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:28 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:29 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:29 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r0 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r0], 0x3}, 0x58) process_mrelease(r1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000680), 0x1, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r6 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r6, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r7, 0x2, '\x00', 0x0, r4, 0x3, 0x3}, 0x48) 05:46:29 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:29 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40000000, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:29 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r5, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:29 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:29 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) process_mrelease(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:30 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:30 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:31 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:31 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) pidfd_open(0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r6, r0, 0x0) 05:46:31 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 05:46:31 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980), 0x290100, 0x0) pidfd_getfd(r8, r0, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, r8, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) 05:46:31 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x40000000, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x20080, 0x0) setsockopt$MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x400, @mcast2, 0xfed}, {0xa, 0x4e24, 0x7, @local, 0x4}, 0xffffffffffffffff, {[0x2, 0xfffffffd, 0x1, 0x7, 0x1ff, 0x0, 0xb0, 0xfb30]}}, 0x5c) r1 = syz_clone(0x200100, &(0x7f0000000440)="3f03a43a6259e58fc364156685b319c7bcb332a8eb885b747d58f6b49c74e930c1be9d2396c9666ce7dbd42f7b94439cbe64421001af5cde74c1a73a7f285da7feadb88db5580fa3fc52b8a8f7aa5efbca6da69f8c02bf28af9ccf177aeea94170c649974ad7be00df60c0969fadf30d0e7083a8510937475517d945e950065dd2c5e1", 0x83, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="a565b2ef9a1fe36be156785e661f79d284cda1ab2db150ef7721e34fd0bfe0941a74340f4f40efd3b3ff60214a6022ad8f362f014ff070852c") syz_clone3(&(0x7f0000000600)={0x200c500, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x0, {0xd}, &(0x7f0000000300)=""/34, 0x22, &(0x7f0000000340)=""/254, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0, r1], 0x3}, 0x58) process_mrelease(r2, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000680), 0x1, 0x0) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000700), 0x4e000, 0x0) r5 = pidfd_getfd(r4, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000740)) socket$l2tp(0x2, 0x2, 0x73) pidfd_send_signal(0xffffffffffffffff, 0xd, &(0x7f0000000800)={0x5, 0x8, 0x10}, 0x0) pidfd_open(r3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x20008804) r7 = pidfd_open(0xffffffffffffffff, 0x0) process_mrelease(r7, 0x0) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x3c, 0x2000, 0xfff, 0xa7, 0x1e0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r5, 0x3, 0x3}, 0x48) [ 137.935082][ T6204] ================================================================== [ 137.943188][ T6204] BUG: KCSAN: data-race in mem_cgroup_track_foreign_dirty_slowpath / mem_cgroup_track_foreign_dirty_slowpath [ 137.954744][ T6204] [ 137.957064][ T6204] write to 0xffff88811ccaa770 of 8 bytes by task 6191 on cpu 1: [ 137.964694][ T6204] mem_cgroup_track_foreign_dirty_slowpath+0x3b3/0x440 [ 137.971558][ T6204] __folio_mark_dirty+0x3fc/0x4e0 [ 137.976594][ T6204] mark_buffer_dirty+0x148/0x240 [ 137.981531][ T6204] block_write_end+0x158/0x2e0 [ 137.986304][ T6204] ext4_write_end+0x176/0x810 [ 137.990995][ T6204] ext4_da_write_end+0xad/0x9c0 [ 137.995855][ T6204] generic_perform_write+0x267/0x410 [ 138.001139][ T6204] ext4_buffered_write_iter+0x1f6/0x370 [ 138.006692][ T6204] ext4_file_write_iter+0x297/0xe10 [ 138.011898][ T6204] __kernel_write_iter+0x162/0x390 [ 138.017016][ T6204] dump_user_range+0x25d/0x480 [ 138.021790][ T6204] elf_core_dump+0x1a85/0x1ba0 [ 138.026554][ T6204] do_coredump+0x102a/0x1890 [ 138.031143][ T6204] get_signal+0xdb5/0x10a0 [ 138.035559][ T6204] arch_do_signal_or_restart+0x95/0x4b0 [ 138.041103][ T6204] exit_to_user_mode_loop+0x6f/0xe0 [ 138.046302][ T6204] exit_to_user_mode_prepare+0x6c/0xb0 [ 138.051770][ T6204] irqentry_exit_to_user_mode+0x9/0x20 [ 138.057233][ T6204] irqentry_exit+0x12/0x40 [ 138.061652][ T6204] asm_exc_page_fault+0x26/0x30 [ 138.066500][ T6204] [ 138.068818][ T6204] read to 0xffff88811ccaa770 of 8 bytes by task 6204 on cpu 0: [ 138.076350][ T6204] mem_cgroup_track_foreign_dirty_slowpath+0x2fc/0x440 [ 138.083204][ T6204] __folio_mark_dirty+0x3fc/0x4e0 [ 138.088230][ T6204] mark_buffer_dirty+0x148/0x240 [ 138.093174][ T6204] block_write_end+0x158/0x2e0 [ 138.097942][ T6204] ext4_write_end+0x176/0x810 [ 138.102621][ T6204] ext4_da_write_end+0xad/0x9c0 [ 138.107477][ T6204] generic_perform_write+0x267/0x410 [ 138.112758][ T6204] ext4_buffered_write_iter+0x1f6/0x370 [ 138.118306][ T6204] ext4_file_write_iter+0x297/0xe10 [ 138.123684][ T6204] __kernel_write_iter+0x162/0x390 [ 138.128800][ T6204] dump_user_range+0x25d/0x480 [ 138.133565][ T6204] elf_core_dump+0x1a85/0x1ba0 [ 138.138330][ T6204] do_coredump+0x102a/0x1890 [ 138.142929][ T6204] get_signal+0xdb5/0x10a0 [ 138.147433][ T6204] arch_do_signal_or_restart+0x95/0x4b0 [ 138.152979][ T6204] exit_to_user_mode_loop+0x6f/0xe0 [ 138.158173][ T6204] exit_to_user_mode_prepare+0x6c/0xb0 [ 138.163728][ T6204] irqentry_exit_to_user_mode+0x9/0x20 [ 138.169262][ T6204] irqentry_exit+0x12/0x40 [ 138.173696][ T6204] asm_exc_page_fault+0x26/0x30 [ 138.178554][ T6204] [ 138.180876][ T6204] value changed: 0x00000000ffffc020 -> 0x00000000ffffc087 [ 138.187975][ T6204] [ 138.190295][ T6204] Reported by Kernel Concurrency Sanitizer on: [ 138.196437][ T6204] CPU: 0 PID: 6204 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-16039-gac347a0655db #0 [ 138.206409][ T6204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 138.216458][ T6204] ==================================================================