0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0xe4, &(0x7f00000000c0)=""/228, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:36:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="508374300800040000010001", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:20 executing program 2: r0 = socket(0x11, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) 00:36:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 00:36:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:20 executing program 3: syz_clone(0x6d022400, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() 00:36:23 executing program 2: shmget(0x0, 0xf000, 0x0, &(0x7f0000ff0000/0xf000)=nil) 00:36:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="5083743008000400000100010000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000001100)=@abs={0x8, 0x1}, 0x8) 00:36:23 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @local}, 0xc) 00:36:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:36:24 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x7, 0x0, &(0x7f0000000000)) 00:36:24 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000400)={0x80000000, 0x0, "6c9b648fd44539af6fe4f2540121fb927cc0847aa1ac70def9b9489431ec108c"}) 00:36:24 executing program 3: mlock(&(0x7f0000ff2000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0xa) 00:36:24 executing program 2: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000380)) timer_delete(0x0) 00:36:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:26 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$FUSE(r0, 0x0, 0x0) 00:36:26 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x48641, 0x0) 00:36:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='oom_score\x00') write$FUSE_ENTRY(r0, 0x0, 0xfffffffffffffe0e) 00:36:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="5083743008000400000100010000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:26 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='gid_map\x00') read$FUSE(r0, 0x0, 0x0) 00:36:26 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x0, 0x0, &(0x7f0000000040)=0xfffffffffffffff5) 00:36:26 executing program 2: syz_emit_ethernet(0x12e, &(0x7f0000001440)={@empty, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cf1408", 0xf8, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, {[], "da1e42f577c3e01f40a49060c50bf31f1d2d4f4c76a1ba9d1126d450c718408f2de0b5536594bdc84388e9693bab5e4069f093cfbe6b2968a11b96e684dd1b3cce995ea26fe6c67e201e763160845445fe1cb15810587b3b9ec56ba85fe787486b44658cf289aa81f01094db8510331357e2d825d5a88b8c3287fbd8353ddc0dbd38de5b79d8b4debfb83e09bb6c2030636a579a0bc1316b1a1531f0c173167431f25117e3b866a35af70d9c0c6844d79b64745ebd264094e15a3aafe30487599f506dde951e623ffa748a9bce80dc17471bbccd07599686f963c41526ecc1d3e0a5dd3e392b43226cf7510ae3402b67eab2bb4f46a3fc03"}}}}}, 0x0) [ 2189.696562][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2189.701874][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:36:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x200000, 0x0) 00:36:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r2, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r1, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:29 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r0, 0x0, 0x0) 00:36:29 executing program 5: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="006f9b87d00ebfb70000000000000080c851a2bb993380724a1dcd201e00e6f778ba94503695b092e0be5c5b037e71da1135b79a5c80dd959c8f619395475853682b04fb3a1c5df72250ff812ac60cb700153f0821b325a2170e48de0a2c96be398abe13c52be1cd496edb318c85e6be169665bd84cb97070000008fcc9fb06067f61b0770398df19680091f5ad98fa1f74a79115cefe209510e3cd9254752b5f749d4bde5195ffb0000000000b9d2c59f60cb598b9edde1b9c8de68d512ae043d7b22664a018dafded099e42a5c4ffe8679a63fb73f48bb6eb4917d58aec146df5651ff797b45c9"], 0xfe, 0x4b1, &(0x7f0000000540)="$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") truncate(&(0x7f0000000040)='./file1\x00', 0x0) 00:36:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}}, 0x0) [ 2190.123151][T26028] loop5: detected capacity change from 0 to 128 [ 2190.182014][T26028] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 2190.279875][T26028] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 00:36:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:32 executing program 2: mount$9p_tcp(&(0x7f0000002540), &(0x7f0000002580)='./file0\x00', &(0x7f00000025c0), 0x2, 0x0) 00:36:32 executing program 3: io_setup(0x6, &(0x7f0000002100)=0x0) r1 = socket$packet(0x11, 0x3, 0x300) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:36:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r2, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r1, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:32 executing program 5: syz_mount_image$xfs(&(0x7f000000bb00), &(0x7f000000bb40)='./file0\x00', 0x2000000, &(0x7f0000000080)={[{@filestreams}, {@swalloc}, {@grpid}, {@noalign}, {@uqnoenforce}], [{@flag='sync'}]}, 0x1, 0xbaee, &(0x7f000000bbc0)="$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") r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x64, 0x870) 00:36:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="5083743008000400000100010000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:36:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r2, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r1, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:35 executing program 2: r0 = timerfd_create(0x9, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 00:36:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000100)=0xfffffc01, 0x4) 00:36:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='ramfs\x00', 0x0, &(0x7f0000000440)='size') 00:36:39 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000b80)='ns/ipc\x00') 00:36:39 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000033c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000280)='./file1/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000002280)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file1/file0\x00', 0x0) 00:36:39 executing program 5: r0 = openat$damon_rm_contexts(0xffffffffffffff9c, &(0x7f0000000040), 0x181001, 0x0) write$damon_contexts(r0, &(0x7f0000000080)=[{' ', './file0'}, {' ', './file0'}, {' ', './file0'}, {' ', './file0'}], 0x4) 00:36:39 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x204140, 0x0) 00:36:39 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0) 00:36:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="508374300800040000010001000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') read$FUSE(r0, 0x0, 0x0) 00:36:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:43 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000033c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000002280)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x1) 00:36:43 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0x0) faccessat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0x0) 00:36:43 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000001e40), 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 00:36:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="508374300800040000010001000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:43 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d80), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) 00:36:43 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000002240)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x0}}, 0x120) 00:36:46 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000003000), 0x48080, 0x0) 00:36:46 executing program 3: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) 00:36:46 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='3\x00', 0x2) 00:36:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="508374300800040000010001000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:48 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 00:36:48 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 00:36:48 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000033c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x20000000, &(0x7f0000002940)='./file1\x00', &(0x7f0000000000), 0x100a008, 0x0) 00:36:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc0189436, &(0x7f00000000c0)=ANY=[]) 00:36:48 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0x401c5820, &(0x7f00000000c0)=ANY=[]) 00:36:48 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) 00:36:49 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 00:36:49 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@huge_always}]}) 00:36:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2210.024588][T26166] fuse: Bad value for 'user_id' 00:36:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:55 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 00:36:55 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 00:36:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000037c0), 0x2, 0x0) write$FUSE_LK(r0, &(0x7f0000003800)={0x28, 0x5}, 0x28) 00:36:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:55 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 00:36:55 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huge=']) 00:36:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) [ 2215.530258][T26196] fs-verity (nvme0n1p2, inode 1766): Unknown hash algorithm number: 0 [ 2216.286412][T26203] tmpfs: Bad value for 'huge' 00:36:56 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000006580)={0x2020}, 0xffffffb4) 00:36:56 executing program 2: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) 00:36:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x31, &(0x7f0000000200)={@local}, &(0x7f00000003c0)=0x14) 00:36:58 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 00:36:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:58 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:36:58 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80), 0x0) 00:36:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:36:58 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000b80)={0xfffffffffffffffe}, 0x0, 0x0, &(0x7f0000000c80)={0x0, r0+60000000}, &(0x7f0000000d00)={&(0x7f0000000cc0)={[0x5]}, 0x8}) 00:36:58 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) [ 2220.413484][T26238] fs-verity (nvme0n1p2, inode 1771): Unknown hash algorithm number: 0 00:37:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 00:37:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:00 executing program 2: syz_open_dev$vcsn(&(0x7f0000000e00), 0x0, 0x38f000) 00:37:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000a00)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000a40), 0x12) 00:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002f00)={'vxcan1\x00'}) 00:37:01 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000002e80)) [ 2225.401543][T26266] fs-verity (nvme0n1p2, inode 1766): Unknown hash algorithm number: 0 00:37:05 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x81) syz_open_dev$vcsn(0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:06 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000031c0)='ns/user\x00') 00:37:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:06 executing program 5: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) 00:37:07 executing program 3: syz_clone(0x44000000, &(0x7f0000000000)="aba98db20305b326233076c3d4f43216268d91aa40ad7b008611fe1c8238b57a58d0f057d49b8a35e1ffb35ebcd61de029083192f64a094cb20d0544e26ceac546d9364cadae127dfcc00c1553e48772485998cd6b6ff63afcf9c2ed8ce18706d20219cb9d1415c16f6acf11875bb5dc023e7ef5c5d583d22a5761da0a4ec1e331dc4ed76670de11f646c220e0642525d022504d80a1a22737c5250e3cd122c86808f684eede241f55233192ba5b85fac69c63", 0xb3, &(0x7f00000000c0), &(0x7f0000000100), 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)=""/8, 0x8}], 0x1, &(0x7f0000000280)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}, {{&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000440)=""/239, 0xef}, {&(0x7f0000000540)=""/107, 0x6b}, {&(0x7f00000005c0)=""/200, 0xc8}, {&(0x7f00000006c0)=""/109, 0x6d}], 0x4}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/139, 0x8b}, {&(0x7f00000008c0)=""/31, 0x1f}, {&(0x7f0000000900)=""/189, 0xbd}, {&(0x7f00000009c0)=""/56, 0x38}], 0x4, &(0x7f0000000a40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000b00)=""/239, 0xef}, {&(0x7f0000000c00)=""/134, 0x86}], 0x2}}], 0x4, 0x0, &(0x7f0000000e00)) 00:37:07 executing program 2: clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)={0x0, r0+60000000}, 0x0) 00:37:07 executing program 5: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) 00:37:07 executing program 5: r0 = epoll_create1(0x0) getsockname(r0, 0x0, 0x0) 00:37:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:08 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 00:37:08 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x189040, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[], 0xb4, 0x0) 00:37:09 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x189040, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000580)='./file0/file1\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) 00:37:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) signalfd4(r0, 0x0, 0x0, 0x0) 00:37:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004ec0), 0x0, 0x80) 00:37:09 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x189040, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) 00:37:09 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x59a) 00:37:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 00:37:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r2, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:11 executing program 5: io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 00:37:11 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x189141, 0x0) setxattr$incfs_id(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 00:37:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:12 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) 00:37:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, 0x0, 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) 00:37:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0xb54, 0xffffffffffffffff, 0x9}, 0x48) 00:37:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x1f, 0xad, 0x8, 0x9, 0x5, 0x0, 0x1, 0x1, 0x4, 0x81, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 00:37:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000200)=0x2, 0x4) 00:37:13 executing program 2: ioctl$EVIOCGUNIQ(0xffffffffffffff9c, 0x40004508, &(0x7f0000000000)) 00:37:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000000c0)={0x0, 0x5}, 0x8) 00:37:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r2, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:16 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @empty, @val, {@ipv4}}, 0x0) 00:37:16 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) 00:37:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:16 executing program 3: ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x800c55cb, &(0x7f0000000100)) 00:37:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, 0x0, 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 00:37:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 0x0, 0x1}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 00:37:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 00:37:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) 00:37:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, 0x0, 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:18 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 00:37:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r2, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001240)="e3c8621eba5402ec5a3f45632c024ced89b85abe0fbcd3e4231c99e66eb27c6b47971b71deb8d944106fc5ccc08b00df2432ed2f83d16ccc49638eea8d8a6be0eeae634fb6ecd46e3017286bc8c95361b373185f02619c70eff372a221e50d8e7525c2f67a9d66a7aac674802e0f0cd213d009d88123bf5ae51f9141e4f3f3fb582b45e203736a02cb1f6dac984ed47ea679f40af740c64d37c6b1aae910c22dc354c908e9f0200ccfa1e5740d504241ca6f4349e05ac97380db6304f90534e83f454790c3c57b9e2524c5fe26df3a8c197596445ab27a670ab5852937fd0d2b08b4c49f5182a46c1a09521f0915b1cbe59b62", 0xf3}, {&(0x7f0000001340)="5b053a1919112d9a5598cfb87bfa22c518d7de94942d34f7738ed2621cbb7e6b3d2682d9e271bd81c0f3c6323da30be2a7fcbcabd0aeea9758769ebef31d0569916786c816e9c2adee3517e2a22834069d7e57a753941bf7d85743df1bde4a96d5b44dfd36817eb14cef61fbc223ee1792eb629a7dd0a06628c083ec492caeca896420fa8e003aaa95478d6638f79b67dac0918ff0acf37d7c8651dc", 0x9c}, {&(0x7f00000019c0)="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", 0xe73}], 0x3}, 0x20801) 00:37:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000d00), 0x4) 00:37:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002940)={0x0, 0x2, &(0x7f0000002800)=@raw=[@map_idx_val], &(0x7f0000002840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)={'wg2'}, 0x6) 00:37:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:20 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x1000) 00:37:21 executing program 5: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000040), 0x1, 0x0) 00:37:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 00:37:21 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000003e80), 0x0, 0x8040) 00:37:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 00:37:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2c, 0x0, 0x0) 00:37:22 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000001200)={0x63}, 0xb) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/218, 0xda}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xb) 00:37:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:22 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000003e80), 0x0, 0x0) 00:37:22 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x303502, 0x0) 00:37:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 00:37:24 executing program 2: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) 00:37:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000000), 0x0) 00:37:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 00:37:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000000), 0x0) 00:37:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x80800) 00:37:27 executing program 3: gettid() timer_create(0x5, &(0x7f00000000c0)={0x0, 0x1a}, &(0x7f0000000100)) 00:37:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:27 executing program 5: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 00:37:27 executing program 2: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0) 00:37:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x70416ff350f8d0ac}, 0x48) 00:37:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xa, 0x0, 0x0, 0x0, 0x880, 0x1}, 0x48) 00:37:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) 00:37:29 executing program 2: r0 = socket(0x25, 0x1, 0x0) connect$bt_sco(r0, 0x0, 0x0) 00:37:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:30 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000900)={0x1c, r0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0xf}, @void}}}, 0x1c}}, 0x0) 00:37:30 executing program 5: r0 = socket(0x25, 0x1, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) 00:37:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f00000017c0)={0x14}, 0x14}}, 0x0) 00:37:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:30 executing program 3: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) [ 2250.745924][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2250.747514][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:37:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x0, 0x0, 0xb11e, 0x5, 0x1}, 0x48) 00:37:30 executing program 2: r0 = socket(0x18, 0x0, 0x2) bind$x25(r0, 0x0, 0x0) 00:37:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:31 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x80108906, 0x0) 00:37:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$team(&(0x7f00000006c0), r0) 00:37:33 executing program 5: r0 = socket(0x25, 0x1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4040001) 00:37:33 executing program 2: r0 = socket(0x2b, 0x1, 0x0) accept4$x25(r0, 0x0, 0x0, 0x0) 00:37:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(&(0x7f0000001640), r0) 00:37:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:33 executing program 2: r0 = socket(0x21, 0x2, 0x2) write(r0, &(0x7f0000000000), 0x0) 00:37:35 executing program 3: sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 00:37:35 executing program 5: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001080)='ns/time_for_children\x00') 00:37:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:35 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x2}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, r0+10000000}, &(0x7f0000000140)={0x0}) 00:37:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0140000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 00:37:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)) [ 2255.490138][T26648] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 00:37:35 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000500)={'ip6_vti0\x00', &(0x7f0000000480)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @dev}}) 00:37:35 executing program 5: r0 = socket(0x21, 0x2, 0x2) getsockopt$MRT6(r0, 0x29, 0x0, 0x0, 0x0) 00:37:36 executing program 5: r0 = socket(0x18, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 00:37:38 executing program 3: r0 = socket(0x25, 0x1, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x20}}, 0x1) 00:37:38 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:38 executing program 5: r0 = socket(0x18, 0x0, 0x2) accept4$x25(r0, 0x0, 0x0, 0x0) 00:37:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:38 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000001640), 0xffffffffffffffff) 00:37:38 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000140)={0x0, 0x8, 0x0, 0x0, @vifc_lcl_addr=@broadcast, @local}, 0x10) 00:37:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:39 executing program 5: sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, 0x0, 0x0) 00:37:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x140}, 0x14}}, 0x0) 00:37:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:39 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x2}, 0x0, &(0x7f00000000c0)={0x0, r0+10000000}, 0x0) 00:37:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000c80)={@remote}, 0x14) 00:37:42 executing program 3: r0 = socket(0x28, 0x1, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:37:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={0xffffffffffffffff, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 00:37:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:42 executing program 5: r0 = socket(0x25, 0x1, 0x0) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) 00:37:42 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8902, &(0x7f0000000000)) 00:37:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x8000, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x1279, 0x0) 00:37:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:48 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000780)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="7332a3e87c941274d87f4cb69b8e898e5c47d3ea0d146e"]}) 00:37:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8993, &(0x7f0000000380)={'wg2\x00'}) 00:37:48 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3fe, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001200000000000000000000009500000000000000a2b6d3bf477a213cdbcb7088244928109e"], &(0x7f0000000080)='GPL\x00', 0x1, 0x100f, &(0x7f0000001700)=""/4111, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:48 executing program 3: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000700)=ANY=[@ANYBLOB='\x00'], 0x1c}}, 0x0) r0 = socket(0x1, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8902, &(0x7f0000000000)) 00:37:48 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x2a, 0x0, 0x0) 00:37:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter, 0x98) 00:37:48 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8927, &(0x7f0000000380)={'wg2\x00'}) 00:37:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x1, 0x8}]}, &(0x7f0000000080)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:37:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x0) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:51 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x20201, 0x0) read$rfkill(r0, 0x0, 0x0) 00:37:51 executing program 3: r0 = socket(0x1e, 0x4, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:37:51 executing program 5: mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x180020, 0x0) 00:37:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:51 executing program 3: mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', 0x0, 0xedc0, 0x0) 00:37:51 executing program 5: mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) 00:37:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x0, 0x0, 0x2, 0x46c}, 0x48) [ 2274.779465][T26830] fs-verity (nvme0n1p2, inode 1769): Unknown hash algorithm number: 0 00:37:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8923, &(0x7f0000000380)={'wg2\x00'}) 00:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7dcb26a3a1436493d23b0e"], 0x14}}, 0x0) 00:37:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x2f, 0x0, 0x0) 00:37:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x16, 0x0, 0x4, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x20) 00:37:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:55 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/73, 0x9000, 0x1000}, 0x20) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1e013, r0, 0x0) 00:37:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x0) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:37:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x6, 0x3, 0x0, 0x4) 00:37:55 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 00:37:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@polexpire={0xc0, 0x28, 0x1, 0x0, 0x0, {{{@in6=@empty, @in6=@private2}}}}, 0xc0}}, 0x0) [ 2280.089387][T26858] fs-verity (nvme0n1p2, inode 1770): Unknown hash algorithm number: 0 00:38:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001740)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@dstopts={{0x18}}, @dstopts_2292={{0x18}}, @dstopts={{0x18}}], 0x48}, 0x0) [ 2280.206273][T26869] netlink: 172 bytes leftover after parsing attributes in process `syz-executor.2'. 00:38:00 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x25, 0x0, 0x0) 00:38:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xd, 0x0, 0x4}, 0x48) 00:38:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@private0}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 00:38:00 executing program 3: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 00:38:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x0) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:01 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x7fffdf004000, 0x0, 0x1e013, r0, 0x0) 00:38:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x8000, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40101283, 0x0) 00:38:01 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x6a}}, &(0x7f0000000080)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:01 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x29, 0x38, 0x0, 0x0) 00:38:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(0x0, 0x0) 00:38:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x29, 0x6, 0x0, 0x0) 00:38:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:06 executing program 3: add_key(&(0x7f00000002c0)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 00:38:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:06 executing program 5: ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x2004556a, 0x0) 00:38:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x29, 0x43, 0x0, 0x0) 00:38:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(0x0, 0x0) 00:38:11 executing program 2: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80004091}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:38:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:11 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000000)="964680dd1e492941f716f32cdccbb2cbbc0d39d4cf08246a", 0x0, 0x0, 0x0}, 0x38) mount$9p_fd(0x20000000, 0x0, 0x0, 0x0, 0x0) 00:38:12 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 00:38:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x6) 00:38:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x29, 0x33, 0x0, 0x0) 00:38:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xb0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:12 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x60}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(0x0, 0x0) 00:38:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090000000000000000000000c50000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x6a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'net_cls'}]}, 0x9) 00:38:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x53}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:16 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0x1, 0x12) 00:38:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0xa}) 00:38:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:16 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_es_find_extent_range_exit\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[], 0x6a) 00:38:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000580)=""/225, 0x1a, 0xe1, 0x1}, 0x20) 00:38:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}, 0x20000001) 00:38:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:38:19 executing program 3: syz_clone(0x10040200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000580)=""/225, 0x1a, 0xe1, 0x1}, 0x20) 00:38:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000780)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 00:38:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}, 0x20000001) 00:38:19 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80), 0x0}, 0x48) 00:38:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:38:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg$unix(r1, &(0x7f0000000480)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) 00:38:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}, 0x20000001) 00:38:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'Ac'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "c128"}]}, {0x2}}, &(0x7f0000000580)=""/225, 0x36, 0xe1, 0x1}, 0x20) 00:38:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x1100, 0x7}, 0x48) 00:38:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}]}}, &(0x7f0000000080)=""/229, 0x2a, 0xe5, 0x1}, 0x20) 00:38:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x1a, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000140)=""/215, 0xff91, 0xd7, 0x2}, 0x20) 00:38:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'Ac'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "c128"}]}}, &(0x7f0000000580)=""/225, 0x36, 0xe1, 0x1}, 0x20) 00:38:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}, 0x20000001) 00:38:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@func={0x9}, @union]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/186, 0x3b, 0xba, 0x1}, 0x20) 00:38:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x2, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000580)=""/225, 0x1a, 0xe1, 0x1}, 0x20) 00:38:23 executing program 3: syz_clone(0x34ec61a52d04b17c, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x3, 0x1, 0x0, 0xf, 0x2, [{0x2, 0x0, 0x2}], 'Ac'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "c128"}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000580)=""/225, 0x45, 0xe1, 0x1}, 0x20) 00:38:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xf}, {0x4}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x30]}}, &(0x7f0000000080)=""/229, 0x43, 0xe5, 0x1}, 0x20) 00:38:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='4', 0x1}], 0x1}, 0x0) 00:38:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={&(0x7f00000005c0), 0x10, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}, 0x20000001) 00:38:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0) 00:38:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{0x0, 0xffffffff00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 00:38:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:26 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:26 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000200), 0x1, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0) 00:38:26 executing program 1: getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000200), 0x1, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000240)) getpid() syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) recvfrom$phonet(r1, &(0x7f0000000b80)=""/60, 0x3c, 0x2000, 0x0, 0x0) ioctl$SIOCGETMIFCNT_IN6(0xffffffffffffffff, 0x89e0, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpgid(0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000011c0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) 00:38:26 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000ac0)={'vxcan0\x00'}) 00:38:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001080)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000dc0)=@framed, &(0x7f0000000e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:26 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc0205648, &(0x7f0000000100)=@multiplanar_overlay={0x2000000, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5ccac9d2"}, 0x0, 0x3, {0x0}}) 00:38:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) 00:38:26 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc0205649, &(0x7f0000000100)=@multiplanar_overlay={0x0, 0x3, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5ccac9d2"}, 0x0, 0x3, {0x0}}) 00:38:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:28 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f00000000c0), 0xf9a, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x2, @raw_data="5b0a4e89a36ba5e228b8cb6bdfb5c4fad296a00400b782084faa5f16b9dad3d1cd25adb44970ec222a97a701301b25ae906a069a8968fac9303c353da808c5a7b940aca3b6deca90ad32144f29f4a869a67173503263d78d09235173906149951fd49bd44277b81e663322274bc6f22cc7ca2e58a29be6c8a743cb65e3138b8c08d7306dc96a9245a05db51a3b259d7a95d3bb38048f3362f6912ab93e2c7388a630464734cd1eb029417ec0391448206eb19b03ab74243234240817e3651e202e974199c461a03b"}) 00:38:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:29 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000100)=@multiplanar_overlay={0x0, 0x3, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5ccac9d2"}, 0x0, 0x3, {0x0}}) 00:38:29 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) 00:38:29 executing program 5: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000900), 0x40040, 0x0) 00:38:29 executing program 2: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r0, 0xc1086201, &(0x7f0000000080)={'custom0\x00'}) 00:38:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89b1, &(0x7f0000000240)={'sit0\x00', 0x0}) 00:38:29 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, 0x0) 00:38:29 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0}}], 0x1, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/100, 0x64}], 0x1) 00:38:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast}}}}) 00:38:29 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8995, &(0x7f0000000000)={'wg2\x00'}) [ 2312.621492][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2312.623232][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:38:32 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8942, &(0x7f0000000000)={'wg2\x00'}) 00:38:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1) 00:38:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:32 executing program 2: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8920, &(0x7f0000000000)={'wg2\x00'}) 00:38:32 executing program 1: r0 = socket(0x2, 0x3, 0xa8) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) 00:38:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:32 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x9d, 0x0, 0x2, [{0x4, &(0x7f0000000180)=@lang_id={0x4}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4}}]}) 00:38:32 executing program 5: r0 = socket(0xa, 0x3, 0xa8) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="fa002dbd70"], 0x10c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f00000001c0)={'sit0\x00', 0x0}) 00:38:32 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x1}}]}}]}}, 0x0) 00:38:32 executing program 1: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000051c0)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000000c0)='!', 0x1}], 0x1}}], 0x1, 0x0) [ 2312.877485][T27193] udc-core: couldn't find an available UDC or it's busy [ 2312.879307][T27193] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 2312.890052][T27196] udc-core: couldn't find an available UDC or it's busy [ 2312.891801][T27196] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 00:38:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8916, 0x0) 00:38:32 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005900)=[{{&(0x7f0000000400)=@abs, 0x6e, &(0x7f0000001640)=[{&(0x7f0000000480)="05", 0xfffffdef}], 0x1}}], 0x1, 0x10) 00:38:32 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8921, &(0x7f0000000000)={'wg2\x00'}) 00:38:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}}}}) [ 2314.365575][T27213] sit0: mtu greater than device maximum 00:38:34 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000051c0)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000000c0)='!', 0x1}, {&(0x7f0000000100)="e5", 0x1}, {&(0x7f0000000180)=' ', 0x1}], 0x3}}], 0x1, 0x0) 00:38:34 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0xfffffffffffffee3, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}], 0x1, 0x0) 00:38:34 executing program 2: r0 = socket(0x2, 0x3, 0x4) setsockopt$WPAN_WANTACK(r0, 0x3a, 0x0, 0x0, 0x0) 00:38:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x2a6a}, 0x48) 00:38:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4}}]}}, &(0x7f00000000c0)=""/224, 0x46, 0xe0, 0x1}, 0x20) 00:38:35 executing program 2: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x8, 0x20, 0x7f, [{{0x9, 0x4, 0x0, 0x3, 0x0, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x400, 0x4, 0xa8}}, [{}]}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x201, 0x0, 0x0, 0x2, 0x20, 0x9}, 0x9d, &(0x7f00000007c0)=ANY=[], 0x3, [{0x4, &(0x7f0000000180)=@lang_id={0x4}}, {0x0, 0x0}, {0x8f, 0x0}]}) 00:38:35 executing program 1: futex(0x0, 0x85, 0x60, 0x0, 0x0, 0xbfffff7c) 00:38:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setfsgid(0x0) [ 2315.728185][T27231] udc-core: couldn't find an available UDC or it's busy [ 2315.734532][T27231] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 00:38:35 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs={0xa, 0x2}, 0x6e, 0x0}}], 0x1, 0x0) [ 2315.759199][T27233] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 00:38:35 executing program 1: futex(0x0, 0x85, 0x60, 0x0, 0x0, 0xbfffff7c) 00:38:35 executing program 3: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8940, &(0x7f0000000000)={'wg2\x00'}) [ 2315.862590][T27242] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 00:38:35 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000180)=""/229, 0xe5}], 0x2) 00:38:38 executing program 1: futex(0x0, 0x85, 0x60, 0x0, 0x0, 0xbfffff7c) [ 2318.932902][T27257] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 00:38:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8949, &(0x7f0000000240)={'sit0\x00', 0x0}) 00:38:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:38 executing program 3: r0 = socket(0xa, 0x3, 0xa8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f00000001c0)={'sit0\x00', 0x0}) 00:38:38 executing program 5: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0x0, 0x3, 0x1, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x400}}, [{}]}}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x9d, 0x0}) 00:38:38 executing program 1: futex(0x0, 0x85, 0x60, 0x0, 0x0, 0xbfffff7c) [ 2319.057924][T27264] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 00:38:39 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x10, 0x2}}], 0x30}}], 0x1, 0x0) 00:38:39 executing program 3: prctl$PR_GET_PDEATHSIG(0x4, 0x0) [ 2319.078535][T27265] udc-core: couldn't find an available UDC or it's busy [ 2319.080273][T27265] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 00:38:39 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup3(r0, r1, 0x0) 00:38:39 executing program 2: r0 = socket(0x1d, 0x3, 0x1) write$binfmt_elf32(r0, 0x0, 0x0) 00:38:39 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x1}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x9d, 0x0, 0x1, [{0x0, 0x0}]}) 00:38:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8992, &(0x7f0000000240)={'sit0\x00', 0x0}) [ 2319.237871][T27275] udc-core: couldn't find an available UDC or it's busy [ 2319.241986][T27275] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 00:38:41 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder1\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) 00:38:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00') r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) dup3(r1, r0, 0x0) 00:38:41 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000000)={'wg2\x00'}) 00:38:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000b2000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) fsync(r0) 00:38:41 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8948, &(0x7f0000000000)={'wg2\x00'}) 00:38:41 executing program 3: syz_clone(0x8ac8300, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 00:38:42 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80108906, 0x0) 00:38:43 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}], 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) sendmmsg$unix(r0, &(0x7f0000005900)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0}}, {{&(0x7f0000000400)=@abs, 0x6e, 0x0}}], 0x2, 0x0) 00:38:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:43 executing program 1: r0 = socket(0xa, 0x3, 0x1) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 00:38:43 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000000)={'wg2\x00'}) 00:38:44 executing program 1: r0 = socket(0x2, 0x3, 0xa8) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 00:38:44 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x66906400, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:44 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000000)={'wg2\x00'}) 00:38:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:44 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000051c0)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000000c0)='!', 0x1}, {0x0}, {&(0x7f0000000180)=' ', 0x1}], 0x3}}], 0x1, 0x0) 00:38:44 executing program 1: r0 = socket(0x2, 0x3, 0xa8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f00000001c0)={'sit0\x00', 0x0}) 00:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r1, 0xd01, 0x0, 0x0, {{0x5f}}}, 0x14}}, 0x0) 00:38:44 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000000)={'wg2\x00'}) 00:38:44 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@timestamp_prespec={0x44, 0x4}]}}}}}) 00:38:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:45 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000000)={'wg2\x00'}) 00:38:45 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x0) 00:38:45 executing program 2: r0 = socket(0x2, 0x3, 0xa8) bind$bt_l2cap(r0, 0x0, 0x0) 00:38:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x3, 0x3}]}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:38:49 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x10}}], 0x30}}], 0x1, 0x0) 00:38:49 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x34, 0x0, 0x13a, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) ppoll(&(0x7f0000002f00)=[{0xffffffffffffffff, 0xe100}, {0xffffffffffffffff, 0xa008}, {0xffffffffffffffff, 0x4008}, {0xffffffffffffffff, 0x46}, {0xffffffffffffffff, 0x2000}], 0x5, &(0x7f0000000500)={0x77359400}, &(0x7f0000002f80)={[0x2]}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffdef) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 00:38:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/28, 0x1c}], 0x1) 00:38:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:49 executing program 5: r0 = socket(0xa, 0x3, 0x1) setsockopt$WPAN_WANTACK(r0, 0x29, 0x0, 0x0, 0x0) 00:38:49 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0}}], 0x1, 0xfc) 00:38:53 executing program 2: r0 = socket(0xa, 0x3, 0xa8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000100200000000900000004413800c4006600000104"]}) 00:38:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:53 executing program 3: r0 = socket(0x2, 0x3, 0xa8) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0, 0x3c4}}, 0x0) 00:38:53 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = fsopen(&(0x7f0000000040)='sockfs\x00', 0x1) dup3(r0, r1, 0x0) 00:38:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}}}}) 00:38:53 executing program 3: sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000500)={0x77359400}, &(0x7f0000002f80)={[0x2]}, 0x8) ioctl$USBDEVFS_IOCTL(r0, 0x4008550d, &(0x7f0000000040)=@usbdevfs_connect) 00:38:53 executing program 2: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8993, &(0x7f0000000000)={'wg2\x00'}) 00:38:53 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a3, &(0x7f0000000000)={'wg2\x00'}) 00:38:53 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8911, &(0x7f0000000000)={'wg2\x00'}) 00:38:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:54 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005900)=[{{&(0x7f0000000400)=@abs, 0x6e, &(0x7f0000001640)=[{&(0x7f0000000480)="05", 0x1}], 0x1}}], 0x1, 0x4000000) 00:38:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') readahead(r0, 0x0, 0x0) 00:38:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0xf4, 0xff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 00:38:55 executing program 3: r0 = socket(0xa, 0x3, 0x1) setsockopt$inet6_mtu(r0, 0x29, 0x24, 0x0, 0x4) 00:38:55 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs={0x1}, 0x6e, 0x0}}], 0x1, 0x0) 00:38:55 executing program 5: r0 = socket(0xa, 0x3, 0x1) getpeername$packet(r0, 0x0, 0x0) 00:38:56 executing program 3: fsopen(0x0, 0x0) 00:38:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8935, 0x0) 00:38:56 executing program 2: r0 = socket(0x1d, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local}}}}) 00:38:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x891b, 0x0) 00:38:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:38:57 executing program 5: r0 = socket(0x18, 0x0, 0x1) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x0, 0x0) dup3(r1, r0, 0x0) 00:38:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:01 executing program 1: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8994, &(0x7f0000000000)={'wg2\x00'}) 00:39:01 executing program 3: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000500)={0x0, 0x0, 0xfffff000}) 00:39:01 executing program 2: r0 = socket(0x1d, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0040070000000020000080004d"]}) 00:39:01 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x10}}], 0x5000}}], 0x1, 0x0) 00:39:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x80000000, 0x0) preadv2(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x300, 0x0, 0x0, 0x1f) 00:39:01 executing program 1: syz_open_dev$hidraw(0xffffffffffffffff, 0xf2, 0x147642) r0 = syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x40086602, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) recvmmsg$unix(r3, 0x0, 0x0, 0x10022, 0x0) syz_clone3(0x0, 0x0) r4 = syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x167101) write$hidraw(r4, &(0x7f0000000000)="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", 0x300000) 00:39:01 executing program 3: r0 = socket(0x2, 0x3, 0xa8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000001c0)={'sit0\x00', 0x0}) 00:39:01 executing program 5: process_vm_writev(0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/159, 0xa2}, {&(0x7f00000002c0)=""/153, 0x9c}, {&(0x7f0000000140)=""/39, 0xfdb3}, {&(0x7f0000001800)=""/232, 0xe0}, {&(0x7f0000001900)=""/4110, 0xfffffffffffffd66}, {&(0x7f0000000200)=""/143, 0xffb2}, {&(0x7f0000001540)=""/236, 0xfb}], 0x7, &(0x7f0000001700)=[{&(0x7f0000001480)=""/15, 0xf}], 0x1, 0x0) 00:39:01 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:39:01 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x3, {0x0, 0xee01}}}], 0x20}}], 0x1, 0x0) 00:39:01 executing program 5: r0 = socket(0x1d, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 00:39:04 executing program 1: r0 = socket(0xa, 0x3, 0xa8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8936, 0x0) 00:39:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x13, 0x4) 00:39:04 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0}}], 0x1, 0x80fe) 00:39:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:05 executing program 2: r0 = socket(0xa, 0x3, 0x1) bind$bt_l2cap(r0, 0x0, 0x0) 00:39:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r2) 00:39:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:05 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 00:39:05 executing program 5: r0 = socket(0x2, 0x3, 0xa8) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2345.608038][T27542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:05 executing program 5: r0 = socket(0xa, 0x3, 0x1) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 00:39:05 executing program 2: r0 = socket(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8981, 0x0) 00:39:05 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000051c0)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000000c0)='!', 0x1}, {&(0x7f0000000100)="e5", 0x1}, {&(0x7f0000000180)=' ', 0x1}], 0x3}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x138}}], 0x2, 0x0) 00:39:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r4, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r6 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r6, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r8 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r8, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r9 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r9, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r10, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc) r11 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r11, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc) r12 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r12, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x80020000}, 0x48) r13 = socket$netlink(0x10, 0x3, 0x4) writev(r13, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) 00:39:08 executing program 5: r0 = socket(0x1d, 0x3, 0x1) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x0, 0x0) dup3(r1, r0, 0x0) 00:39:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8995, &(0x7f0000000240)={'sit0\x00', 0x0}) 00:39:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:08 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x20}}], 0x1, 0x0) 00:39:08 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$unix(r2, &(0x7f0000001540)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) 00:39:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='personality\x00') r1 = syz_open_dev$loop(&(0x7f0000000800), 0x0, 0x0) dup3(r1, r0, 0x0) 00:39:08 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 00:39:08 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) 00:39:10 executing program 2: syz_emit_ethernet(0x109f, &(0x7f00000001c0)={@random="7b97342d1fc9", @random="51acf2fad762", @val, {@ipv6}}, 0x0) 00:39:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockname$inet6(r1, 0x0, &(0x7f00000000c0)) 00:39:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x1, 0x0, &(0x7f00000001c0)) 00:39:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)=""/117, 0x75}, {&(0x7f0000000100)=""/202, 0xca}, {&(0x7f0000000200)=""/151, 0xfffffffffffffe0f}, {&(0x7f00000002c0)=""/41, 0x29}], 0x4, &(0x7f0000000400)=""/82, 0x52}, 0x0) 00:39:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_buf(r1, 0x0, 0x55, 0x0, 0x0) 00:39:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:10 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffffff) 00:39:10 executing program 3: syz_emit_ethernet(0xfff, &(0x7f00000001c0)={@random="7b97342d1fc9", @random="51acf2fad762", @val, {@ipv6}}, 0x0) 00:39:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:13 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000080)={@loopback}, 0x14) 00:39:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0xc, &(0x7f0000000040)="7ecc6cbe69228c25", 0x8) 00:39:13 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0xc, 0xffffffffffffffff) 00:39:13 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$inet6(r1, 0x0, &(0x7f0000000040)) 00:39:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:13 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x9, 0xffffffffffffffff) 00:39:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 00:39:13 executing program 5: r0 = openat$ptmx(0xffffff9c, &(0x7f0000003880), 0x0, 0x0) fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) 00:39:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:13 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 00:39:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {0x0}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/117, 0x75}], 0x1, &(0x7f0000000400)=""/82, 0x52}, 0xc2) 00:39:16 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) fcntl$getown(r0, 0x5) 00:39:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$dupfd(r0, 0xf, 0xffffffffffffffff) 00:39:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:16 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000440)={@broadcast, @local, @val, {@ipv4}}, 0x0) 00:39:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x8) 00:39:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000080)={0xfffffffffffffe8d, 0x2}, 0x10) 00:39:17 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x1}, 0x1c) 00:39:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {0x0}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x7, &(0x7f0000000040)="e5f3b55830", 0x5) 00:39:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = fcntl$dupfd(r1, 0x0, r0) connect$inet(r2, &(0x7f0000000000)={0xfffffffffffffe35, 0x2}, 0x10) 00:39:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:39:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 00:39:20 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, 0x0, 0x0) 00:39:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000300)={@empty, @multicast2}, 0xc) 00:39:20 executing program 1: openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x200, 0x0) 00:39:20 executing program 2: semget$private(0x0, 0x2, 0x21) 00:39:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:20 executing program 3: semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f00000000c0)=""/232) 00:39:20 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001500), 0x2, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) 00:39:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {0x0}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:23 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/10) 00:39:23 executing program 5: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001500), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 00:39:23 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000040)=""/137) 00:39:23 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x20c200, 0x0) 00:39:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:23 executing program 2: r0 = semget(0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000000)=""/225) 00:39:23 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 00:39:23 executing program 5: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 00:39:24 executing program 1: semctl$SEM_INFO(0x0, 0x2, 0x13, &(0x7f0000000200)=""/204) 00:39:24 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 00:39:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') pread64(r0, &(0x7f0000000340)=""/230, 0xe6, 0x10001) 00:39:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:26 executing program 5: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8912, 0x0) 00:39:26 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x82, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18}, 0xffffff54) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff4000/0x4000)=nil, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045003, &(0x7f0000000180)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 00:39:26 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, 0x0, 0x0) 00:39:26 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 00:39:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:26 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, 0x0, 0x0) 00:39:26 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 00:39:26 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x10) 00:39:26 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 00:39:26 executing program 3: syz_clone(0x64020000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)) sched_setattr(0x0, &(0x7f0000001940)={0x38}, 0x0) pipe2$watch_queue(0x0, 0x80) 00:39:26 executing program 2: sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002b06"], 0x20}}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 00:39:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000200)=""/195, 0x2a, 0xc3, 0x1}, 0x20) 00:39:31 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 00:39:31 executing program 1: socketpair(0x1d, 0x0, 0x7, &(0x7f0000000040)) 00:39:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@deltaction={0x18, 0x31, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 00:39:31 executing program 1: syz_clone(0x64020000, &(0x7f00000000c0)="ca", 0x1, &(0x7f0000000040), 0x0, 0x0) 00:39:31 executing program 2: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x64020000, &(0x7f00000000c0), 0x0, &(0x7f0000000040), 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) 00:39:32 executing program 5: timerfd_create(0x0, 0x0) pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x9}, 0x0, 0x0, 0x0) 00:39:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x5421, &(0x7f0000000040)={'pim6reg1\x00'}) 00:39:32 executing program 3: socket(0x25, 0x1, 0x80000000) 00:39:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:39:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:33 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 00:39:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2}, 0x48) [ 2374.253619][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2374.255174][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:39:34 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002140)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') 00:39:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:34 executing program 5: socket$inet(0x2, 0x0, 0x0) getrusage(0x0, &(0x7f0000000a80)) 00:39:34 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "ec7a3a9d12be4b383fc94f2e16f0ba8deb771d170ba935a51fe67b2684cd41445688f1da5903a89553b339ca0661dcfd436652bfb1d02ba7aedb35f818e0b3a8"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f00000000c0)='4', 0x1) 00:39:41 executing program 2: bpf$PROG_LOAD(0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 00:39:41 executing program 3: syz_io_uring_setup(0x1, &(0x7f00000000c0)={0x0, 0xf7bf}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000140)) 00:39:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x20, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 00:39:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:41 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_batadv\x00'}) 00:39:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f235", 0x3}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:41 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x4a0}, {&(0x7f0000000fc0)=""/4096, 0xd5c}, {&(0x7f0000000400)=""/106, 0xf8}, {&(0x7f0000000740)=""/73, 0x1d4}, {&(0x7f0000000200)=""/77, 0x33}, {&(0x7f00000007c0)=""/154, 0x3b3}, {&(0x7f0000000100)=""/22, 0x3ce}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:39:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'blake2b-512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000380)="876e843b7e3ddfd48fcd4d948323380505895cc9bf462467e1ab38adcfdcca1190185491912a06cb57842e5736c27dfa797d11456834b65b0c49c4c7adc9c41a323b45871f6444aebd72f2f05ad110ad2034778d1610197507432d7541c0aa38167ee41d0ffc14b2dd87fec899a1e56fa897c8133fccd2a88add439394e9ea1813", 0x7ffff000}], 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000003c0)=@can={{}, 0x0, 0x0, 0x4, 0x0, "5b0a31ecfdd9238b"}, 0x10}}, 0x0) 00:39:44 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000480)=""/231, 0xe7}], 0x1, 0x2, 0x0) 00:39:44 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, 0x0) 00:39:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f235", 0x3}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x17, &(0x7f0000000040)={@multicast2, @broadcast}, 0xc) 00:39:44 executing program 5: syz_mount_image$xfs(&(0x7f000000bb00), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1, 0xbb31, &(0x7f00000176c0)="$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") r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.log\x00', 0x8440, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x8040587f, 0xffffffffffffffff) 00:39:45 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x4a0}, {&(0x7f0000000fc0)=""/4096, 0xd5c}, {&(0x7f0000000400)=""/106, 0xf8}, {&(0x7f0000000740)=""/73, 0x1d4}, {&(0x7f0000000200)=""/77, 0x33}, {&(0x7f00000007c0)=""/154, 0x3b3}, {&(0x7f0000000100)=""/22, 0x3ce}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:39:45 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff43"], 0x10) 00:39:45 executing program 1: r0 = syz_io_uring_setup(0x6da4, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 00:39:45 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x4a0}, {&(0x7f0000000fc0)=""/4096, 0xd5c}, {&(0x7f0000000400)=""/106, 0xf8}, {&(0x7f0000000740)=""/73, 0x1d4}, {&(0x7f0000000200)=""/77, 0x33}, {&(0x7f00000007c0)=""/154, 0x3b3}, {&(0x7f0000000100)=""/22, 0x3ce}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:39:45 executing program 1: keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000240)={'xcbc-aes-ce\x00'}}) 00:39:45 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000440)={0x8, 0x10001, 0x0, 'queue1\x00'}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) 00:39:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f235", 0x3}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0xe, 0x0, 0x0, 0x2}, 0x48) 00:39:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'erspan0\x00'}, 0x18) 00:39:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x2, 0xdf, &(0x7f0000000180)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:39:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x4a0}, {&(0x7f0000000fc0)=""/4096, 0xd5c}, {&(0x7f0000000400)=""/106, 0xf8}, {&(0x7f0000000740)=""/73, 0x1d4}, {&(0x7f0000000200)=""/77, 0x33}, {&(0x7f00000007c0)=""/154, 0x3b3}, {&(0x7f0000000100)=""/22, 0x3ce}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:39:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f23561", 0x4}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) 00:39:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000000)={0x1, @write_local_name={{0xc13, 0xf8}, {"265fccbd66ae510d9fbf76635c22a3456748325b30d6b0037251b09bccd8bc1d0195f740fcd013c07d569f016988b08ffdaa2245ea61e70cb453925a15b0a2420c24106da6443ab92250f400787829e5e25d1431d252dac1f9d079c0859635d748ee7c1cb2c076df04ac1e70d88c32cfe97662932d43fe3486b156e69af17eb331511ea4d272b91aa94248df89d8708223e9b0f26219cb531b1680dee1d7d9c3303ceddecaac5b00ea0b4b5048f7d96762ad1d3373566b78fed79821dde55327f24f6153ddd340615e3f1b2c75aecf35616c511d1db122dba83565f1687628eaea2d267afce1d636d69b91c2b70dff9d9f639fec58c8fc29"}}}, 0xfc) 00:39:54 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x4000000) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) vmsplice(0xffffffffffffffff, &(0x7f00000009c0)=[{&(0x7f0000001400)="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", 0xc64}, {&(0x7f0000000480)}, {0x0}, {0x0}, {0x0}], 0x5, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') socket$kcm(0x29, 0x2, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000140)=""/30, 0x1e}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20004890) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x12000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f0000000180), 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0xd) io_uring_enter(r2, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) 00:39:54 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 00:39:54 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0x40044102, 0x0) 00:39:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x9, &(0x7f0000000080)={@multicast1}, 0xc) 00:39:54 executing program 3: syz_clone(0xc0006000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000000)="f5a71270dcb406fc54b0dea2b499b9deb78050948350ba6425d1e018ff8450dd065a028b5f01939c68d3e9ffc9b3cd3d98382684bc2522e76ffa82d366758efe3bf95b013c9a0a3483b273aad8a826952036610c3576a82784839d0db07ba30ae2700cba632b79b0536c1d3111f57efd414a43902a205a127854109e26b1", 0x7e, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="edcb00f05d91ecd3b9f03957b88bdeb806bd2cd174a6ff2ca786f38bf7d250b518648537d79a14376ff8") 00:39:54 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) bind$unix(r2, &(0x7f0000000040)=@file={0x0, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x205) 00:39:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:56 executing program 1: mlock(&(0x7f0000ff2000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff3000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x0) 00:39:56 executing program 5: syz_open_dev$vivid(&(0x7f0000000000), 0x3, 0x2) pselect6(0x40, &(0x7f0000000400)={0x8}, 0x0, 0x0, 0x0, 0x0) 00:39:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f23561", 0x4}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:56 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x68831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000080), 0x2, 0x8001) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:39:56 executing program 2: sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0), 0xc, 0x0}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "526120fa17c0a0ffffffff99511e0d828c2b26"}) 00:39:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, 0x8) 00:39:56 executing program 3: syz_mount_image$jfs(&(0x7f0000005e00), &(0x7f0000005e40)='./file0\x00', 0x0, &(0x7f0000005ec0)={[{@discard_size={'discard', 0x3d, 0x80}}, {@noquota}, {@iocharset={'iocharset', 0x3d, 'cp932'}}]}, 0x1, 0x5dcc, &(0x7f0000000000)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/109, 0x6d) 00:39:57 executing program 5: fsopen(&(0x7f0000000080)='efivarfs\x00', 0x0) 00:39:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f23561", 0x4}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:57 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x101) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x21}, 0x21) write$FUSE_STATFS(r0, &(0x7f00000020c0)={0x60}, 0x60) 00:39:57 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000c80), 0x7, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000080)) [ 2399.269382][T27988] loop3: detected capacity change from 0 to 32768 00:39:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x0, 0x0, 0x2200}, 0x48) 00:39:59 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r0, 0x40305829, 0x0) 00:39:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)) 00:39:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) 00:39:59 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) splice(r0, &(0x7f0000000000), r1, 0x0, 0x4, 0x0) 00:39:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xe) 00:39:59 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000040), 0x0, 0x418b00) 00:40:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) 00:40:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000180)={0x0, 0x0, 0x1e56, 0x0, 0x0, "6bdf010780d2a112"}) 00:40:01 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) 00:40:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:01 executing program 5: read$snddsp(0xffffffffffffffff, 0x0, 0x0) 00:40:01 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000009c0)) 00:40:01 executing program 3: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x40060100, 0x0, 0x0, 0x0, 0x0, 0x0) 00:40:01 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000006c80)='./file1\x00', 0x2000, &(0x7f0000006cc0)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@smackfsroot={'smackfsroot', 0x3d, 'dont_measure'}}, {@uid_lt}]}}, 0x0, 0x0, &(0x7f0000006e00)="ba6ed61c996a8a1e35e898ae5e8f011a6009f958d27a7223b878b741b32d83a505c5ca690644d1a58130179ce05a87d063eb899cae5f77c2de34629cb4d8492aee6006ffa4d5cb2ddbf0daeedc5c635759c629d7894abb590e9a7460e324d8106f58aa1a4814aa1b54") 00:40:04 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000003c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, 0x0) 00:40:04 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000003c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0x4c, 0x0, &(0x7f00000005c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:40:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:04 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000003c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000100)=[@enter_looper], 0x1, 0x0, &(0x7f0000000180)="e7"}) 00:40:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2405.029630][T28071] binder: 28070:28071 ioctl c00c620f 0 returned -14 [ 2405.063217][T28074] binder: 28074 RLIMIT_NICE not set [ 2405.070693][T28075] binder: 28072:28075 transaction failed 29189/-22, size 0-0 line 2893 [ 2405.085438][T20058] binder: undelivered TRANSACTION_ERROR: 29189 00:40:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 00:40:05 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000003c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000780)) 00:40:05 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 00:40:05 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000009c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000b00)={0x0, [0xffffffff, 0x9, 0x1]}) 00:40:05 executing program 5: fspick(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@smackfsfloor={'smackfsfloor', 0x3d, '\\#['}}]}}) read$FUSE(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f000000b740), 0x2, 0x1) mount$fuseblk(&(0x7f000000b680), 0x0, &(0x7f000000b700), 0x0, &(0x7f000000b780)={{'fd', 0x3d, r2}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}], [{@subj_type={'subj_type', 0x3d, '$[.{'}}]}}) 00:40:05 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x6c49e1c957022543) 00:40:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x7ff, 0x0, 0x3, 0x0, 0xe1b, 0x6}) 00:40:05 executing program 5: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000055c0), 0x2, 0x0) getresgid(&(0x7f0000009740), &(0x7f0000009780), &(0x7f00000097c0)) 00:40:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$KDADDIO(r0, 0x5457, 0x0) 00:40:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:08 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000055c0), 0x2, 0x0) 00:40:08 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000000640)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000800)={0x28, 0x0, 0x0, @host}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000009c0)) syz_genetlink_get_family_id$tipc(&(0x7f0000000f80), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000001000), 0xffffffffffffffff) 00:40:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$KDADDIO(r0, 0x80045432, 0x0) 00:40:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x74}}, 0x0) 00:40:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x8912, 0x0) 00:40:10 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) read(r0, &(0x7f0000000000)=""/44, 0x2c) 00:40:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x30}}, 0x0) 00:40:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) 00:40:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x89a0, 0x0) 00:40:12 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x328, 0xffffffff, 0x0, 0x100, 0x100, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x1}}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'batadv_slave_1\x00', 'gre0\x00', {}, {}, 0x0, 0x3}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 00:40:12 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x164080, 0x0) [ 2412.176245][T28163] x_tables: duplicate underflow at hook 2 00:40:12 executing program 5: statx(0xffffffffffffffff, &(0x7f0000006940)='./file0\x00', 0x0, 0x0, 0x0) 00:40:14 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053900)={0x0, [], 0x0, "91fa8097e5b9f1"}) clock_getres(0x2, &(0x7f0000000000)) 00:40:15 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001ec0), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) 00:40:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) 00:40:15 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000200)={&(0x7f0000000140), 0x8}) 00:40:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:15 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0x4147, 0x0) 00:40:15 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x280c4, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000001740)=',', 0x1, 0x0, 0x0, 0x0) 00:40:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x68831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x183, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000040)) 00:40:16 executing program 5: syz_mount_image$f2fs(&(0x7f0000000680), &(0x7f0000008080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000000)=ANY=[], 0x5, 0x7e6f, &(0x7f0000008180)="$eJzs3M1uG1UUAODjhEZAS4kQC3aMxI8ciVhjO6mgbCKqqgtIFdGy7MKxHcttYkdx4oSuuuHnIdjBinfgAdix6aJvgMQOCSFVqEGemUioVDQirtM63yddH9/rm3PvHU0inVHkAM6s+eSP30txMV6JiNmIuBCRvS8VLbOSh7ci4u2ImPlHKxXjo86t0cBcRLwaERdHyfOcpWLu9z99feuHXz9977sff55Nv/3mt9M7NXCadiPi3YjY2s77+1t57HfyeLsYbwy7WdxaGhYx/2DrTtHv53G/vZ5l2G8czWtksd7J5/e39wajuLHZaI5ip7uRjW/38gUHw85RnuwHbjd2sn6rvZ7F7qCfxc7dfF8HRbw72M3ztIp8Xzbz8+0exXy8fdDOz7N9J4vN3m4xnuftt9oHozgsYrFctNb//zV+UXzW7e0dJMP2zqDb7yXLlWpaSRd3mpcW07T6UX2x02psNC+1a0utxsZSUm6vDPqbC0m502wm5WtXriwk1bRSq6QfJNeuf5FstpLyKH7S7e3tdjcHC0mtUl+uVBeSd6rJjdW1ZO3zq1dX124mq/1ecr0/TOppUq1fXq5drn+YrN24mdTSWur8E1Wa8HpMmSfcQH/mf74PHx1mJr8ngOfcOOv/UP8Dx3S26v/iPOr/fzlx/fv+i13/qv/hBNxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABn1vlfPt7L3szn/Zli/LVi6I2iXyo+O3yC0mM5Z0d5I+LcMed/VYqYK9Y4ai9FxErR/nr92V4DAAAAmGYPHpbvl7JqPX+Z/+/pM+cmsy1O6F4eHj1l2lz2Wrpwb0zLZo91nnIPHV/2IOrNcWWbzfY3rpOej+IJ1Vhkv1YvjyvbscxOdDUAAOD5oBIAAACAqfb4v+EDAAAA00f9DwAAANMvq/99/x8AAABMtwcPy/dPew8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH+zc/cmCENBAIDv+dcEUZzCHWwcwRFcwtrKQdzIxiJz2ImoRZ4gIlHQEAjfB4/jcuGSK19zAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF1XHBab8jw//trnevtoW1f8zzQAAABArWkVejkd50eznKdce3d3Ty+t+hFRRMTwy/d3KWKUv/E4g4hY5nOZND08AAAAdFe5P63a/gcAAAAAAAAAAAAAAAAAAADgSRv7/9ZVsP8PAAAAmmP/HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB3duflBAAYhAFoPwt0/2mLoBsIXt6DhBwDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANBnZ9apcaPe9C8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPjswIEQAAAAAjF/2Bzy+NsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgbWe/jk0ohKEogL4kC6T6+/whrN3WWdxCkaQQsTaI58AlcNPc9v0j1tKSj6K2Pvf/aVvmu/cqPTX4rX6jBwAAAPAFpSdOt3qqAwcBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOzszqEVADAIRLGW7sP+41Xw8DhMYvgCcQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIy80cc90RmVAACU7JvLQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+O3AgAAAAAADk/9oIVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVdiBAwEAAAAAQf7WKwxQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFQAA//87CCDW") mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) 00:40:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x3400, &(0x7f0000000040)=@raw=[@alu], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:40:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2430.167496][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 00:40:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f23561", 0x4}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {0x0}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x0, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2436.795811][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2436.797499][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:40:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f23561", 0x4}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f235", 0x3}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd", 0x4}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x0, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {0x0}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd", 0x4}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {0x0}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:40:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x0, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd", 0x4}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x3, 0x4}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a9", 0x6}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x3, 0x4}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x3, 0x4}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a9", 0x6}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2503.474256][ T2047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2503.482117][ T2047] ieee802154 phy1 wpan1: encryption failed: -22 00:41:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a9", 0x6}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80), 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e", 0x7}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e", 0x7}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:41:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e", 0x7}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2526.243346][ C0] ------------[ cut here ]------------ [ 2526.243383][ C0] [ 2526.243386][ C0] ====================================================== [ 2526.243390][ C0] WARNING: possible circular locking dependency detected [ 2526.243394][ C0] 5.15.103-syzkaller #0 Not tainted [ 2526.243401][ C0] ------------------------------------------------------ [ 2526.243404][ C0] syz-executor.1/28729 is trying to acquire lock: [ 2526.243410][ C0] ffff800014a702d8 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0x28/0xd8 [ 2526.243440][ C0] [ 2526.243440][ C0] but task is already holding lock: [ 2526.243443][ C0] ffff800015188898 (depot_lock){-.-.}-{2:2}, at: stack_depot_save+0x204/0x4a0 [ 2526.243466][ C0] [ 2526.243466][ C0] which lock already depends on the new lock. [ 2526.243466][ C0] [ 2526.243469][ C0] [ 2526.243469][ C0] the existing dependency chain (in reverse order) is: [ 2526.243472][ C0] [ 2526.243472][ C0] -> #3 (depot_lock){-.-.}-{2:2}: [ 2526.243484][ C0] _raw_spin_lock_irqsave+0xc4/0x14c [ 2526.243496][ C0] stack_depot_save+0x204/0x4a0 [ 2526.243505][ C0] kasan_save_stack+0x54/0x68 [ 2526.243514][ C0] kasan_record_aux_stack+0xd4/0x11c [ 2526.243523][ C0] irq_work_queue_on+0xcc/0x224 [ 2526.243533][ C0] tell_cpu_to_push+0x1d8/0x408 [ 2526.243541][ C0] balance_rt+0x268/0x354 [ 2526.243549][ C0] __schedule+0x724/0x1f1c [ 2526.243557][ C0] schedule+0x11c/0x1c8 [ 2526.243564][ C0] futex_wait_queue_me+0x1f4/0x40c [ 2526.243573][ C0] futex_wait+0x24c/0x56c [ 2526.243580][ C0] do_futex+0xfcc/0x2d88 [ 2526.243587][ C0] __arm64_sys_futex+0x424/0x498 [ 2526.243595][ C0] invoke_syscall+0x98/0x2b8 [ 2526.243605][ C0] el0_svc_common+0x138/0x258 [ 2526.243614][ C0] do_el0_svc+0x58/0x14c [ 2526.243623][ C0] el0_svc+0x7c/0x1f0 [ 2526.243633][ C0] el0t_64_sync_handler+0x84/0xe4 [ 2526.243642][ C0] el0t_64_sync+0x1a0/0x1a4 [ 2526.243650][ C0] [ 2526.243650][ C0] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 2526.243663][ C0] _raw_spin_lock_nested+0xb4/0x110 [ 2526.243672][ C0] raw_spin_rq_lock_nested+0x2c/0x44 [ 2526.243681][ C0] task_fork_fair+0x7c/0x23c [ 2526.243690][ C0] sched_cgroup_fork+0x334/0x3d8 [ 2526.243699][ C0] copy_process+0x24d4/0x3750 [ 2526.243709][ C0] kernel_clone+0x1d8/0xbe0 [ 2526.243718][ C0] kernel_thread+0x148/0x1bc [ 2526.243727][ C0] rest_init+0x2c/0x38c [ 2526.243735][ C0] arch_call_rest_init+0x14/0x20 [ 2526.243746][ C0] start_kernel+0x440/0x600 [ 2526.243755][ C0] __primary_switched+0xa8/0xb0 [ 2526.243764][ C0] [ 2526.243764][ C0] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 2526.243776][ C0] _raw_spin_lock_irqsave+0xc4/0x14c [ 2526.243785][ C0] try_to_wake_up+0xb0/0xc2c [ 2526.243794][ C0] wake_up_process+0x18/0x24 [ 2526.243802][ C0] __up+0x11c/0x148 [ 2526.243810][ C0] up+0x90/0xb0 [ 2526.243817][ C0] __up_console_sem+0x8c/0x100 [ 2526.243827][ C0] console_unlock+0x1160/0x1394 [ 2526.243836][ C0] vprintk_emit+0x13c/0x218 [ 2526.243845][ C0] vprintk_default+0xa0/0xe4 [ 2526.243854][ C0] vprintk+0x218/0x2f0 [ 2526.243861][ C0] _printk+0xdc/0x128 [ 2526.243869][ C0] addrconf_notify+0x9e8/0xc58 [ 2526.243878][ C0] raw_notifier_call_chain+0xd4/0x164 [ 2526.243887][ C0] netdev_state_change+0x180/0x22c [ 2526.243897][ C0] linkwatch_do_dev+0x2b0/0x3c8 [ 2526.243905][ C0] __linkwatch_run_queue+0x424/0x730 [ 2526.243914][ C0] linkwatch_event+0x58/0x68 [ 2526.243922][ C0] process_one_work+0x84c/0x14b8 [ 2526.243931][ C0] worker_thread+0x910/0x1034 [ 2526.243940][ C0] kthread+0x37c/0x45c [ 2526.243947][ C0] ret_from_fork+0x10/0x20 [ 2526.243955][ C0] [ 2526.243955][ C0] -> #0 ((console_sem).lock){-.-.}-{2:2}: [ 2526.243967][ C0] __lock_acquire+0x32cc/0x7620 [ 2526.243977][ C0] lock_acquire+0x2c0/0x89c [ 2526.243985][ C0] _raw_spin_lock_irqsave+0xc4/0x14c [ 2526.243994][ C0] down_trylock+0x28/0xd8 [ 2526.244002][ C0] __down_trylock_console_sem+0x80/0x144 [ 2526.244012][ C0] console_trylock+0xb8/0x1f8 [ 2526.244020][ C0] console_trylock_spinning+0x1c/0x280 [ 2526.244030][ C0] vprintk_emit+0x120/0x218 [ 2526.244039][ C0] vprintk_default+0xa0/0xe4 [ 2526.244048][ C0] vprintk+0x218/0x2f0 [ 2526.244055][ C0] _printk+0xdc/0x128 [ 2526.244062][ C0] __warn_printk+0xb4/0x134 [ 2526.244070][ C0] stack_depot_save+0x490/0x4a0 [ 2526.244078][ C0] kasan_save_stack+0x54/0x68 [ 2526.244086][ C0] kasan_record_aux_stack+0xd4/0x11c [ 2526.244095][ C0] irq_work_queue_on+0xcc/0x224 [ 2526.244115][ C0] rto_push_irq_work_func+0x13c/0x340 [ 2526.244124][ C0] irq_work_single+0xbc/0x1e4 [ 2526.244132][ C0] irq_work_run+0x108/0x25c [ 2526.244141][ C0] ipi_handler+0x108/0x7d4 [ 2526.244150][ C0] handle_percpu_devid_irq+0x174/0x300 [ 2526.244159][ C0] handle_domain_irq+0xec/0x178 [ 2526.244167][ C0] gic_handle_irq+0x78/0x1c8 [ 2526.244177][ C0] call_on_irq_stack+0x2c/0x54 [ 2526.244185][ C0] do_interrupt_handler+0x74/0x94 [ 2526.244194][ C0] el1_interrupt+0x30/0x58 [ 2526.244203][ C0] el1h_64_irq_handler+0x18/0x24 [ 2526.244212][ C0] el1h_64_irq+0x78/0x7c [ 2526.244219][ C0] mark_page_accessed+0x40/0x1238 [ 2526.244229][ C0] touch_buffer+0x1d8/0x480 [ 2526.244239][ C0] __find_get_block+0x1e8/0xdd4 [ 2526.244248][ C0] __getblk_gfp+0x48/0x700 [ 2526.244257][ C0] __ext4_get_inode_loc+0x3ac/0xb14 [ 2526.244266][ C0] ext4_reserve_inode_write+0x160/0x328 [ 2526.244275][ C0] __ext4_mark_inode_dirty+0x33c/0xab8 [ 2526.244283][ C0] ext4_dirty_inode+0xd0/0x100 [ 2526.244291][ C0] __mark_inode_dirty+0x458/0x16d4 [ 2526.244303][ C0] generic_write_end+0x15c/0x238 [ 2526.244311][ C0] ext4_da_write_end+0x6a0/0x9b0 [ 2526.244319][ C0] generic_perform_write+0x354/0x520 [ 2526.244328][ C0] ext4_buffered_write_iter+0x3d8/0x538 [ 2526.244338][ C0] ext4_file_write_iter+0x688/0x163c [ 2526.244347][ C0] __kernel_write+0x488/0x8b0 [ 2526.244356][ C0] __dump_emit+0x200/0x338 [ 2526.244364][ C0] dump_emit+0x288/0x36c [ 2526.244373][ C0] dump_user_range+0xd0/0x35c [ 2526.244381][ C0] elf_core_dump+0x2ef4/0x3640 [ 2526.244390][ C0] do_coredump+0x12c8/0x2890 [ 2526.244399][ C0] get_signal+0x3dc/0x1550 [ 2526.244408][ C0] do_notify_resume+0x320/0x32b8 [ 2526.244418][ C0] el0_da+0x118/0x20c [ 2526.244426][ C0] el0t_64_sync_handler+0xc0/0xe4 [ 2526.244436][ C0] el0t_64_sync+0x1a0/0x1a4 [ 2526.244443][ C0] [ 2526.244443][ C0] other info that might help us debug this: [ 2526.244443][ C0] [ 2526.244446][ C0] Chain exists of: [ 2526.244446][ C0] (console_sem).lock --> &rq->__lock --> depot_lock [ 2526.244446][ C0] [ 2526.244461][ C0] Possible unsafe locking scenario: [ 2526.244461][ C0] [ 2526.244463][ C0] CPU0 CPU1 [ 2526.244466][ C0] ---- ---- [ 2526.244468][ C0] lock(depot_lock); [ 2526.244474][ C0] lock(&rq->__lock); [ 2526.244480][ C0] lock(depot_lock); [ 2526.244486][ C0] lock((console_sem).lock); [ 2526.244491][ C0] [ 2526.244491][ C0] *** DEADLOCK *** [ 2526.244491][ C0] [ 2526.244493][ C0] 4 locks held by syz-executor.1/28729: [ 2526.244499][ C0] #0: ffff0000d3f20460 (sb_writers#3){.+.+}-{0:0}, at: do_coredump+0x12a4/0x2890 [ 2526.244525][ C0] #1: ffff00015fd12bd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa4/0x538 [ 2526.244551][ C0] #2: ffff0000d3f0e990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0xfb4/0x12c0 [ 2526.244574][ C0] #3: ffff800015188898 (depot_lock){-.-.}-{2:2}, at: stack_depot_save+0x204/0x4a0 [ 2526.244596][ C0] [ 2526.244596][ C0] stack backtrace: [ 2526.244600][ C0] CPU: 0 PID: 28729 Comm: syz-executor.1 Not tainted 5.15.103-syzkaller #0 [ 2526.244610][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 2526.244616][ C0] Call trace: [ 2526.244619][ C0] dump_backtrace+0x0/0x530 [ 2526.244629][ C0] show_stack+0x2c/0x3c [ 2526.244638][ C0] dump_stack_lvl+0x108/0x170 [ 2526.244647][ C0] dump_stack+0x1c/0x58 [ 2526.244655][ C0] print_circular_bug+0x150/0x1b8 [ 2526.244665][ C0] check_noncircular+0x2cc/0x378 [ 2526.244674][ C0] __lock_acquire+0x32cc/0x7620 [ 2526.244683][ C0] lock_acquire+0x2c0/0x89c [ 2526.244691][ C0] _raw_spin_lock_irqsave+0xc4/0x14c [ 2526.244700][ C0] down_trylock+0x28/0xd8 [ 2526.244708][ C0] __down_trylock_console_sem+0x80/0x144 [ 2526.244718][ C0] console_trylock+0xb8/0x1f8 [ 2526.244727][ C0] console_trylock_spinning+0x1c/0x280 [ 2526.244737][ C0] vprintk_emit+0x120/0x218 [ 2526.244746][ C0] vprintk_default+0xa0/0xe4 [ 2526.244755][ C0] vprintk+0x218/0x2f0 [ 2526.244762][ C0] _printk+0xdc/0x128 [ 2526.244769][ C0] __warn_printk+0xb4/0x134 [ 2526.244777][ C0] stack_depot_save+0x490/0x4a0 [ 2526.244785][ C0] kasan_save_stack+0x54/0x68 [ 2526.244793][ C0] kasan_record_aux_stack+0xd4/0x11c [ 2526.244802][ C0] irq_work_queue_on+0xcc/0x224 [ 2526.244811][ C0] rto_push_irq_work_func+0x13c/0x340 [ 2526.244819][ C0] irq_work_single+0xbc/0x1e4 [ 2526.244828][ C0] irq_work_run+0x108/0x25c [ 2526.244837][ C0] ipi_handler+0x108/0x7d4 [ 2526.244846][ C0] handle_percpu_devid_irq+0x174/0x300 [ 2526.244855][ C0] handle_domain_irq+0xec/0x178 [ 2526.244863][ C0] gic_handle_irq+0x78/0x1c8 [ 2526.244871][ C0] call_on_irq_stack+0x2c/0x54 [ 2526.244879][ C0] do_interrupt_handler+0x74/0x94 [ 2526.244888][ C0] el1_interrupt+0x30/0x58 [ 2526.244897][ C0] el1h_64_irq_handler+0x18/0x24 [ 2526.244906][ C0] el1h_64_irq+0x78/0x7c [ 2526.244913][ C0] mark_page_accessed+0x40/0x1238 [ 2526.244922][ C0] touch_buffer+0x1d8/0x480 [ 2526.244931][ C0] __find_get_block+0x1e8/0xdd4 [ 2526.244941][ C0] __getblk_gfp+0x48/0x700 [ 2526.244950][ C0] __ext4_get_inode_loc+0x3ac/0xb14 [ 2526.244958][ C0] ext4_reserve_inode_write+0x160/0x328 [ 2526.244966][ C0] __ext4_mark_inode_dirty+0x33c/0xab8 [ 2526.244974][ C0] ext4_dirty_inode+0xd0/0x100 [ 2526.244983][ C0] __mark_inode_dirty+0x458/0x16d4 [ 2526.244992][ C0] generic_write_end+0x15c/0x238 [ 2526.245000][ C0] ext4_da_write_end+0x6a0/0x9b0 [ 2526.245008][ C0] generic_perform_write+0x354/0x520 [ 2526.245016][ C0] ext4_buffered_write_iter+0x3d8/0x538 [ 2526.245025][ C0] ext4_file_write_iter+0x688/0x163c [ 2526.245034][ C0] __kernel_write+0x488/0x8b0 [ 2526.245043][ C0] __dump_emit+0x200/0x338 [ 2526.245050][ C0] dump_emit+0x288/0x36c [ 2526.245059][ C0] dump_user_range+0xd0/0x35c [ 2526.245067][ C0] elf_core_dump+0x2ef4/0x3640 [ 2526.245075][ C0] do_coredump+0x12c8/0x2890 [ 2526.245084][ C0] get_signal+0x3dc/0x1550 [ 2526.245092][ C0] do_notify_resume+0x320/0x32b8 [ 2526.245110][ C0] el0_da+0x118/0x20c [ 2526.245119][ C0] el0t_64_sync_handler+0xc0/0xe4 [ 2526.245128][ C0] el0t_64_sync+0x1a0/0x1a4 [ 2526.495456][ C0] Stack depot reached limit capacity [ 2526.495661][ C0] WARNING: CPU: 0 PID: 28729 at lib/stackdepot.c:114 stack_depot_save+0x494/0x4a0 [ 2526.499036][ C0] Modules linked in: [ 2526.499949][ C0] CPU: 0 PID: 28729 Comm: syz-executor.1 Not tainted 5.15.103-syzkaller #0 [ 2526.501864][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 2526.504003][ C0] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2526.505727][ C0] pc : stack_depot_save+0x494/0x4a0 [ 2526.506884][ C0] lr : stack_depot_save+0x490/0x4a0 [ 2526.508041][ C0] sp : ffff800008007af0 [ 2526.509058][ C0] x29: ffff800008007b00 x28: 0000000000000160 x27: 00000000000000c0 [ 2526.510982][ C0] x26: 0000000000000000 x25: 00000000000ef75e x24: ffff0001b3000000 [ 2526.512741][ C0] x23: 00000000646ef75e x22: 0000000000000140 x21: 0000000000000000 [ 2526.514471][ C0] x20: 0000000000000028 x19: ffff800008007b60 x18: 0000000000010002 [ 2526.516237][ C0] x17: ff808000083386a0 x16: ffff800011a05534 x15: ffff8000083386a0 [ 2526.518112][ C0] x14: 00000000ffffffff x13: ffffffffffffffff x12: 0000000000000000 [ 2526.519949][ C0] x11: ff80800008330148 x10: 0000000000010001 x9 : af1751a4d82d0600 [ 2526.521774][ C0] x8 : af1751a4d82d0600 x7 : 0000000000000001 x6 : 0000000000000001 [ 2526.523551][ C0] x5 : ffff800008007258 x4 : ffff800014aa0780 x3 : ffff8000085517f0 [ 2526.525270][ C0] x2 : 0000000000000001 x1 : 0000000100010001 x0 : 0000000000000022 [ 2526.526985][ C0] Call trace: [ 2526.527698][ C0] stack_depot_save+0x494/0x4a0 [ 2526.528752][ C0] kasan_save_stack+0x54/0x68 [ 2526.529735][ C0] kasan_record_aux_stack+0xd4/0x11c [ 2526.531007][ C0] irq_work_queue_on+0xcc/0x224 [ 2526.532148][ C0] rto_push_irq_work_func+0x13c/0x340 [ 2526.533244][ C0] irq_work_single+0xbc/0x1e4 [ 2526.534289][ C0] irq_work_run+0x108/0x25c [ 2526.535258][ C0] ipi_handler+0x108/0x7d4 [ 2526.536201][ C0] handle_percpu_devid_irq+0x174/0x300 [ 2526.537413][ C0] handle_domain_irq+0xec/0x178 [ 2526.538471][ C0] gic_handle_irq+0x78/0x1c8 [ 2526.539496][ C0] call_on_irq_stack+0x2c/0x54 [ 2526.540546][ C0] do_interrupt_handler+0x74/0x94 [ 2526.541671][ C0] el1_interrupt+0x30/0x58 [ 2526.542645][ C0] el1h_64_irq_handler+0x18/0x24 [ 2526.543802][ C0] el1h_64_irq+0x78/0x7c [ 2526.544760][ C0] mark_page_accessed+0x40/0x1238 [ 2526.545833][ C0] touch_buffer+0x1d8/0x480 [ 2526.546912][ C0] __find_get_block+0x1e8/0xdd4 [ 2526.547960][ C0] __getblk_gfp+0x48/0x700 [ 2526.548950][ C0] __ext4_get_inode_loc+0x3ac/0xb14 [ 2526.550043][ C0] ext4_reserve_inode_write+0x160/0x328 [ 2526.551239][ C0] __ext4_mark_inode_dirty+0x33c/0xab8 [ 2526.552479][ C0] ext4_dirty_inode+0xd0/0x100 [ 2526.553547][ C0] __mark_inode_dirty+0x458/0x16d4 [ 2526.554653][ C0] generic_write_end+0x15c/0x238 [ 2526.555764][ C0] ext4_da_write_end+0x6a0/0x9b0 [ 2526.556840][ C0] generic_perform_write+0x354/0x520 [ 2526.557993][ C0] ext4_buffered_write_iter+0x3d8/0x538 [ 2526.559237][ C0] ext4_file_write_iter+0x688/0x163c [ 2526.560413][ C0] __kernel_write+0x488/0x8b0 [ 2526.561432][ C0] __dump_emit+0x200/0x338 [ 2526.562431][ C0] dump_emit+0x288/0x36c [ 2526.563378][ C0] dump_user_range+0xd0/0x35c [ 2526.564397][ C0] elf_core_dump+0x2ef4/0x3640 [ 2526.565457][ C0] do_coredump+0x12c8/0x2890 [ 2526.566489][ C0] get_signal+0x3dc/0x1550 [ 2526.567479][ C0] do_notify_resume+0x320/0x32b8 [ 2526.568602][ C0] el0_da+0x118/0x20c [ 2526.569494][ C0] el0t_64_sync_handler+0xc0/0xe4 [ 2526.570641][ C0] el0t_64_sync+0x1a0/0x1a4 [ 2526.571568][ C0] irq event stamp: 57862 [ 2526.572481][ C0] hardirqs last enabled at (57861): [] exit_to_kernel_mode+0x100/0x178 [ 2526.574779][ C0] hardirqs last disabled at (57862): [] enter_el1_irq_or_nmi+0x10/0x1c [ 2526.576950][ C0] softirqs last enabled at (57846): [] __do_softirq+0xcc4/0xf60 [ 2526.578963][ C0] softirqs last disabled at (57533): [] __irq_exit_rcu+0x28c/0x534 [ 2526.581036][ C0] ---[ end trace 459e8abf3d2c38b8 ]--- 00:42:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @private=0xa010101]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, 0x0, 0x0, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x4, 0x2}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x5, [@multicast1, @local, @empty]}, @timestamp={0x44, 0x8, 0x2, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r3, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x5, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x7ff]}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:42:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffd, 0x0, 0x2}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x20, 0x0, 0x0, 0x0, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0x13, 0x5, [@multicast1, @local, @private=0xa010101, @empty]}, @timestamp={0x44, 0x4, 0x2}, @rr={0x7, 0x7, 0x4, [@loopback]}, @timestamp_addr={0x44, 0x4}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x8923, &(0x7f0000000680)={'syztnl2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="50837430080004000001000100000000", @ANYRES32=r4, @ANYBLOB="0020004000000000800000014703d2a53bdae5405fd60178e0000002ac1414bb07f1"]}) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000400)=r6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001c40)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) pidfd_open(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{&(0x7f00000007c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000800)="a16cbafd6f", 0x5}, {&(0x7f0000000840)="c05fa3b34d60727b77641e3269b63374bf5713d4dd098d03091b78e5109a0142507e68cf9b00896fad10eafa9fd98c31868f25a2591db4b85ab638ea3cffecc0d5bad13f3c8e122c1456b50b5bb1e8fe2148bb6ccea39ceac44a574d543ef96fa06208f7a9a2871c1ef30afa6305", 0x6e}, {&(0x7f00000009c0)="d643661690cef8b7b79a60e8971763feecc8b3be893e5ba1a2dba614f5cbe129990ae3cdb2", 0x25}, {&(0x7f0000000a80)="fd720b4b2cac1150f5b16ed322c307ce4a7e5cd4b72af0b2c48162ad8d5df29870c870aee7ac2cdcadbf592ee310412811b261c927047a1c735ff97535d1f3f4eed2a5e12d1dc8008dec382d56a320e645d2f237f11ba42e911ad3e0bf7fcf7ad23008e0dcb9ac1860611ff9410807ac9862fad36a718ac53e2ac3583914f4544d4d62ca728bb56679a2a4", 0x8b}, {&(0x7f0000000b40)="e22decfd89a93e35", 0x8}, {&(0x7f0000000b80)="d2f2356164", 0x5}], 0x6, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}}], 0x1, 0x24000841) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)