0x22, 0x0, 0x61) 07:31:45 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:45 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:45 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) (async) 07:31:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:45 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x61) 07:31:45 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:45 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x61) 07:31:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) (async) 07:31:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) r7 = syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r9, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r10, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, r10, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) ptrace$setsig(0x4203, r7, 0x1, &(0x7f0000000200)={0x1b, 0x5}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000023c0)=@bpf_ext={0x1c, 0x8, &(0x7f0000002440)=ANY=[@ANYBLOB="85000000190004000006e3ffffffffffff000400002bb19117009a050000000000ff0f000095000000000000957931ed00050000003d5e9cf6f0af1d0783124a3af690c21de7b274c55d1b81dd51fdbcf758ee29c04251af967a9f58f8659cd2fa42840a63444db10becf1da2e6651d0bd03b786ac34983e3bc688e7492a6f52827a9e482a9f1635d0a3728cb4b48059fb563e8d3832840265dff04d745567abc280522323f5557a4805fb75b722a4f608d7bd39f19e864dd9cc8c66ce0c162240da9cddddfb99719ab28b537aaa4a1b96c2053d09b2b6eaf3a58d7aa51deddf77ae15e1fe0aa3c0baa08cd0c04be2ef7a512467e1d8a2dc6e27e488437c1500"/271], &(0x7f0000002200)='syzkaller\x00', 0x9, 0xd1, &(0x7f0000002240)=""/209, 0x40f00, 0xb, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000002380)={0x0, 0xb, 0x6f9e, 0x9}, 0x10, 0x1637a, r4}, 0x80) 07:31:45 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x400, 0x4, 0x2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:45 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x61) 07:31:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x0, 0x0, 0x0, 0x1686, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 07:31:46 executing program 4: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x61) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x400, 0x4, 0x2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x0, 0x0, 0x0, 0x1686, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 07:31:46 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x400, 0x4, 0x2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:46 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) r7 = syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r9, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r10, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, r10, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) ptrace$setsig(0x4203, r7, 0x1, &(0x7f0000000200)={0x1b, 0x5}) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x4, 0x2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:46 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x0, 0x0, 0x0, 0x1686, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 07:31:46 executing program 4: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {&(0x7f0000000c40)=""/100, 0x64}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:46 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e21, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xdf}}}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x80000, 0x1, 0x0, 0x1206, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:46 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r8, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r9, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, r9, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:47 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e21, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xdf}}}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x80000, 0x1, 0x0, 0x1206, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) 07:31:47 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {&(0x7f0000000c40)=""/100, 0x64}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2000000000}, 0x48) 07:31:47 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000000000}, 0x48) 07:31:47 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e21, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xdf}}}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x80000, 0x1, 0x0, 0x1206, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x80000, 0x1, 0x0, 0x1206, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) 07:31:47 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:47 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x100}, 0x48) 07:31:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, r8, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:47 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {&(0x7f0000000c40)=""/100, 0x64}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:47 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 07:31:47 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 07:31:48 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 07:31:48 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:48 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:48 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000580)={0x0, 0x0, 0xffffffffffffffff, 0xdd}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x73d258bd, 0x1ff, 0xfff, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x8}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv6_delroute={0x34, 0x19, 0x200, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x10, 0x2, 0xfc, 0x3, 0x0, 0x5, 0xe00}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @empty}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) r5 = syz_open_dev$audion(&(0x7f0000000380), 0x2, 0x612001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9a5}, @jmp={0x5, 0x0, 0x0, 0x6, 0x6, 0x18, 0xfffffffffffffff0}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @generic={0xcc, 0x3, 0xc, 0x5}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0x80000001, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x5, 0xb86a, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, r4, r0, r5, r0, r0, r0, r6, r0, r7]}, 0x80) 07:31:48 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:48 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="000000000000000060405000000000008500000052000000dd016500fcffffff850000004d000000ff8841f8ff0f0000186800000600000000000000be010000e67bb5c7b804b4cf25aec4128a91a92aa2cd134ae4faeeb89df0db9f324d96bcedac4c6248ba0dd9505c16ddbf6b07c78e78b93b96edbc0820c9f5ace480391eeb0fa5951f8cfaddcda8fcfe1314cbbe3b05867af6ddc34da902be4ecc9504913dbdf3d5e4b40dfeca4b98659e19c665d7846ab3d22f0354dcd21e9c412a691c411ba4be36db93cc7976492808425deb245536f78a590b05d7dcc1f86b2d11c03a9e58da47a77ea4f941af3dfdce4686085c0ee00679d900aec17ed945c2e7384e7de037e4d367e8ccaa3c6a33729904b6f6fc1ee23adeca61d6fa91665f393934c3a46a337546b2a5e162e5"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb}, 0x48) 07:31:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:49 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000580)={0x0, 0x0, 0xffffffffffffffff, 0xdd}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x73d258bd, 0x1ff, 0xfff, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x8}, 0x48) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv6_delroute={0x34, 0x19, 0x200, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x10, 0x2, 0xfc, 0x3, 0x0, 0x5, 0xe00}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @empty}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) (async) r5 = syz_open_dev$audion(&(0x7f0000000380), 0x2, 0x612001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9a5}, @jmp={0x5, 0x0, 0x0, 0x6, 0x6, 0x18, 0xfffffffffffffff0}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @generic={0xcc, 0x3, 0xc, 0x5}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0x80000001, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x5, 0xb86a, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, r4, r0, r5, r0, r0, r0, r6, r0, r7]}, 0x80) 07:31:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:49 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:49 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:49 executing program 4: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:49 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000580)={0x0, 0x0, 0xffffffffffffffff, 0xdd}) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x73d258bd, 0x1ff, 0xfff, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x8}, 0x48) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv6_delroute={0x34, 0x19, 0x200, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x10, 0x2, 0xfc, 0x3, 0x0, 0x5, 0xe00}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @empty}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) (async) r5 = syz_open_dev$audion(&(0x7f0000000380), 0x2, 0x612001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9a5}, @jmp={0x5, 0x0, 0x0, 0x6, 0x6, 0x18, 0xfffffffffffffff0}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @generic={0xcc, 0x3, 0xc, 0x5}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0x80000001, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x5, 0xb86a, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, r4, r0, r5, r0, r0, r0, r6, r0, r7]}, 0x80) 07:31:49 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:50 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffff9}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000001c0)=""/124) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x7fff, 0x2, {"e67715d1736749467427f78fbd43f8c3"}, 0x8000000000000001, 0x7, 0xb7d}}}, 0xa0) 07:31:50 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:50 executing program 4: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000ac0)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffff9}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000001c0)=""/124) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x7fff, 0x2, {"e67715d1736749467427f78fbd43f8c3"}, 0x8000000000000001, 0x7, 0xb7d}}}, 0xa0) 07:31:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:50 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffff9}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000001c0)=""/124) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r3, 0x30, 0x0, @ib={0x1b, 0x7fff, 0x2, {"e67715d1736749467427f78fbd43f8c3"}, 0x8000000000000001, 0x7, 0xb7d}}}, 0xa0) 07:31:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="000000000000000060405000000000008500000052000000dd016500fcffffff850000004d000000ff8841f8ff0f0000186800000600000000000000be010000e67bb5c7b804b4cf25aec4128a91a92aa2cd134ae4faeeb89df0db9f324d96bcedac4c6248ba0dd9505c16ddbf6b07c78e78b93b96edbc0820c9f5ace480391eeb0fa5951f8cfaddcda8fcfe1314cbbe3b05867af6ddc34da902be4ecc9504913dbdf3d5e4b40dfeca4b98659e19c665d7846ab3d22f0354dcd21e9c412a691c411ba4be36db93cc7976492808425deb245536f78a590b05d7dcc1f86b2d11c03a9e58da47a77ea4f941af3dfdce4686085c0ee00679d900aec17ed945c2e7384e7de037e4d367e8ccaa3c6a33729904b6f6fc1ee23adeca61d6fa91665f393934c3a46a337546b2a5e162e5"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}]}, 0x1c}}, 0x0) 07:31:50 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}]}, 0x1c}}, 0x0) 07:31:50 executing program 3: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3}, 0x48) 07:31:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) 07:31:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}]}, 0x1c}}, 0x0) 07:31:51 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:51 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:51 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/194, 0xc2}, {&(0x7f0000000e80)=""/23, 0x17}, {&(0x7f0000000240)=""/56, 0x38}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/28, 0x1c}, {&(0x7f0000000c00)=""/181, 0xb5}, {&(0x7f0000000b80)=""/113, 0x71}, {&(0x7f0000000500)=""/50, 0x32}, {&(0x7f0000000540)=""/131, 0x83}], 0x9}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000a40)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x800, 0x0, 0xffffffffffffffff}) r3 = syz_open_dev$audion(&(0x7f0000000a80), 0x3, 0x10000) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1b, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18390000030000000000000000000000185900000c0000000000040000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x83, 0xc1, &(0x7f0000000cc0)=""/193, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x8, 0x48, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000dc0)=[r1, r2, r3, 0xffffffffffffffff, r0, r4, r0]}, 0x80) r5 = syz_open_dev$audion(&(0x7f0000000800), 0x0, 0x280041) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000440)={0x50, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xa8f}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008001}, 0x24048080) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1, 0x3, 0xd1, 0x7fffffff, 0x203, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x48) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000700)=@raw=[@alu={0x7, 0x0, 0xc, 0x7, 0x0, 0x50, 0x4}], &(0x7f0000000740)='syzkaller\x00', 0x8, 0x5e, &(0x7f0000000780)=""/94, 0x41000, 0x14, '\x00', 0x0, 0x1c, r5, 0x8, &(0x7f0000000840)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x7f, 0x200}, 0x10, 0x103cd, r6, 0x0, &(0x7f0000000940)=[r7, r8, r11, r12]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000f00)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r8, &(0x7f0000001140)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001100)={&(0x7f0000000f40)={0x188, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x8c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x40844}, 0x10) 07:31:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) r4 = gettid() msgctl$IPC_SET(r2, 0x1, &(0x7f0000000680)={{0x0, 0xee00, 0xee00, 0xee01, 0xee00, 0x4c, 0x400}, 0x0, 0x0, 0xca1, 0xed, 0x1ffe000000000, 0x9, 0x1, 0x34eb, 0x7, 0x7, r3, r4}) 07:31:51 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async, rerun: 64) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/194, 0xc2}, {&(0x7f0000000e80)=""/23, 0x17}, {&(0x7f0000000240)=""/56, 0x38}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/28, 0x1c}, {&(0x7f0000000c00)=""/181, 0xb5}, {&(0x7f0000000b80)=""/113, 0x71}, {&(0x7f0000000500)=""/50, 0x32}, {&(0x7f0000000540)=""/131, 0x83}], 0x9}, 0x0) (async, rerun: 64) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000a40)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x800, 0x0, 0xffffffffffffffff}) r3 = syz_open_dev$audion(&(0x7f0000000a80), 0x3, 0x10000) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1b, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18390000030000000000000000000000185900000c0000000000040000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x83, 0xc1, &(0x7f0000000cc0)=""/193, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x8, 0x48, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000dc0)=[r1, r2, r3, 0xffffffffffffffff, r0, r4, r0]}, 0x80) r5 = syz_open_dev$audion(&(0x7f0000000800), 0x0, 0x280041) (async, rerun: 32) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) (async) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000440)={0x50, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xa8f}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008001}, 0x24048080) (async, rerun: 32) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1, 0x3, 0xd1, 0x7fffffff, 0x203, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x48) (async, rerun: 32) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000700)=@raw=[@alu={0x7, 0x0, 0xc, 0x7, 0x0, 0x50, 0x4}], &(0x7f0000000740)='syzkaller\x00', 0x8, 0x5e, &(0x7f0000000780)=""/94, 0x41000, 0x14, '\x00', 0x0, 0x1c, r5, 0x8, &(0x7f0000000840)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x7f, 0x200}, 0x10, 0x103cd, r6, 0x0, &(0x7f0000000940)=[r7, r8, r11, r12]}, 0x80) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000f00)={'wg2\x00', 0x0}) (rerun: 32) sendmsg$ETHTOOL_MSG_COALESCE_GET(r8, &(0x7f0000001140)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001100)={&(0x7f0000000f40)={0x188, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x8c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x40844}, 0x10) 07:31:51 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:31:51 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/194, 0xc2}, {&(0x7f0000000e80)=""/23, 0x17}, {&(0x7f0000000240)=""/56, 0x38}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/28, 0x1c}, {&(0x7f0000000c00)=""/181, 0xb5}, {&(0x7f0000000b80)=""/113, 0x71}, {&(0x7f0000000500)=""/50, 0x32}, {&(0x7f0000000540)=""/131, 0x83}], 0x9}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000a40)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x800, 0x0, 0xffffffffffffffff}) (async) r3 = syz_open_dev$audion(&(0x7f0000000a80), 0x3, 0x10000) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1b, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18390000030000000000000000000000185900000c0000000000040000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x83, 0xc1, &(0x7f0000000cc0)=""/193, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x8, 0x48, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000dc0)=[r1, r2, r3, 0xffffffffffffffff, r0, r4, r0]}, 0x80) r5 = syz_open_dev$audion(&(0x7f0000000800), 0x0, 0x280041) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) (async) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) (async) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000440)={0x50, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xa8f}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008001}, 0x24048080) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1, 0x3, 0xd1, 0x7fffffff, 0x203, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x48) (async) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r12, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000700)=@raw=[@alu={0x7, 0x0, 0xc, 0x7, 0x0, 0x50, 0x4}], &(0x7f0000000740)='syzkaller\x00', 0x8, 0x5e, &(0x7f0000000780)=""/94, 0x41000, 0x14, '\x00', 0x0, 0x1c, r5, 0x8, &(0x7f0000000840)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x7f, 0x200}, 0x10, 0x103cd, r6, 0x0, &(0x7f0000000940)=[r7, r8, r11, r12]}, 0x80) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000f00)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r8, &(0x7f0000001140)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001100)={&(0x7f0000000f40)={0x188, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x8c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x40844}, 0x10) 07:31:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) r4 = gettid() msgctl$IPC_SET(r2, 0x1, &(0x7f0000000680)={{0x0, 0xee00, 0xee00, 0xee01, 0xee00, 0x4c, 0x400}, 0x0, 0x0, 0xca1, 0xed, 0x1ffe000000000, 0x9, 0x1, 0x34eb, 0x7, 0x7, r3, r4}) 07:31:51 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) syz_clone(0x80000000, &(0x7f0000000080)="d981ab99ee98356dcc4a06a9e13a6ed6df4374df1f22dfe787a952deede91dd93175053df8010bde2d48a149778d55d7d2be3426a441ce2ceade0027d5c60ba979cd69933ba72f6bdb083c0321a1b05c0ed12fe3ce75d68805a351078ebb7750a1b239b611c67ee921269f77d3b9ac6516b368595a11df52a0eb3d8307112239788be744b04da9a510dcd48ee1b0b2b46aee1b2fe486061c565cd61bc679ac99cdc48213c7d1ea08d930e6a5e948f99e6d9a519753a04ad6c2ad1ef43d", 0xbd, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="981212eab374fd449b46048871038676426ec33cb104ffc0ee9bb2fa70385d059b10dc7b47283d195bd557ac4b350981b573") write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x5, 0x1606}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000300)={&(0x7f0000000400)="94b14e1a55426c666eff82f0614216adbee9e9f18dd63a4419b31f4cfc58623cbaa06c2c82d71d0fbec6c645c899c9dae34fdecc484c93cb9b55b474fe99a646d39067883c740fc76829396dfb40aea4bef1a8d69f5947360ed433638d873b01d24e622624e496a053bf29ce8c7c40aa21c562213256a718217ca52efaf87464ace79cd338611b3cb0949b9a4251", &(0x7f0000000100)=""/13, &(0x7f0000000140)="6ab78e7acdbfd0d0b28126102a8e5684eeaa0455a3e0feca0977b1952367249f150edc52cf62be6939b6aaf58d4ca0e5023e1e5cc41601bcdaf89a616910d6316dc8006f224082fc89fc62cef5e2d1fc4215b9f7b0b8d155884e138badc5a590a136fd42ba93a5dce763359fa17d9b9906f721c9689748b7560b1a94473380376836d7a8067d3cf857ce7cfda0bf51976f3c2bd4fd343a519e1d36bf24da804306854eaac3ea6a925d5c584bb0d49e", &(0x7f0000000200)="cf6268c73e6c45de863b0e64cb6670276812cfdf2a04240d9e125332f1a0959e30914ee35528ce4e457d2e7698b38a662f043f888584a215d216ad87bc0af862d32774fa9c8a3bf65b7859ace95d628695985afe19f2e681c1b50f41a921f1b5cdb7e2c6ffe0bd7801c34246cfcd7d58394cc0a6cf306d0551978b37bb18cf57bb3b8c9b8fb07f7ab30f167a5c66bd9ac1662c0f80eb14aaa2ba8d65c448ef4a55f265c83dd951cd2ecd3686743d1c1e0b9a6d5d6e89104378eadf414c402b44fbbf7dfbb32b172e882ed3d3433fc12179c2f9fe91a27e30f5a4bcffc25d6dabb06cd65339b1e11336e373a88225fc64a9cf85d4", 0x6, r0, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000080)="a94679de969d84d5567672005d47fb5ca945f7bb720fbf00d255547cc31bb6ee42142e007dc522b13599f05a78de585c8d0a63e72073ae7b6c287801c2d99b5104e0614e0897ca213b64ede2c224167b74b9467edf7e3dd8fbba6b9a19925fb4923030256e1ad3ad5950c2ae44e1", &(0x7f0000000340)=""/68}, 0x20) 07:31:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:52 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:52 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/50, 0x32}, {0x0}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) r4 = gettid() msgctl$IPC_SET(r2, 0x1, &(0x7f0000000680)={{0x0, 0xee00, 0xee00, 0xee01, 0xee00, 0x4c, 0x400}, 0x0, 0x0, 0xca1, 0xed, 0x1ffe000000000, 0x9, 0x1, 0x34eb, 0x7, 0x7, r3, r4}) 07:31:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x5, 0x1606}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000300)={&(0x7f0000000400)="94b14e1a55426c666eff82f0614216adbee9e9f18dd63a4419b31f4cfc58623cbaa06c2c82d71d0fbec6c645c899c9dae34fdecc484c93cb9b55b474fe99a646d39067883c740fc76829396dfb40aea4bef1a8d69f5947360ed433638d873b01d24e622624e496a053bf29ce8c7c40aa21c562213256a718217ca52efaf87464ace79cd338611b3cb0949b9a4251", &(0x7f0000000100)=""/13, &(0x7f0000000140)="6ab78e7acdbfd0d0b28126102a8e5684eeaa0455a3e0feca0977b1952367249f150edc52cf62be6939b6aaf58d4ca0e5023e1e5cc41601bcdaf89a616910d6316dc8006f224082fc89fc62cef5e2d1fc4215b9f7b0b8d155884e138badc5a590a136fd42ba93a5dce763359fa17d9b9906f721c9689748b7560b1a94473380376836d7a8067d3cf857ce7cfda0bf51976f3c2bd4fd343a519e1d36bf24da804306854eaac3ea6a925d5c584bb0d49e", &(0x7f0000000200)="cf6268c73e6c45de863b0e64cb6670276812cfdf2a04240d9e125332f1a0959e30914ee35528ce4e457d2e7698b38a662f043f888584a215d216ad87bc0af862d32774fa9c8a3bf65b7859ace95d628695985afe19f2e681c1b50f41a921f1b5cdb7e2c6ffe0bd7801c34246cfcd7d58394cc0a6cf306d0551978b37bb18cf57bb3b8c9b8fb07f7ab30f167a5c66bd9ac1662c0f80eb14aaa2ba8d65c448ef4a55f265c83dd951cd2ecd3686743d1c1e0b9a6d5d6e89104378eadf414c402b44fbbf7dfbb32b172e882ed3d3433fc12179c2f9fe91a27e30f5a4bcffc25d6dabb06cd65339b1e11336e373a88225fc64a9cf85d4", 0x6, r0, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000080)="a94679de969d84d5567672005d47fb5ca945f7bb720fbf00d255547cc31bb6ee42142e007dc522b13599f05a78de585c8d0a63e72073ae7b6c287801c2d99b5104e0614e0897ca213b64ede2c224167b74b9467edf7e3dd8fbba6b9a19925fb4923030256e1ad3ad5950c2ae44e1", &(0x7f0000000340)=""/68}, 0x20) 07:31:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 07:31:52 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x5, 0x1606}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000300)={&(0x7f0000000400)="94b14e1a55426c666eff82f0614216adbee9e9f18dd63a4419b31f4cfc58623cbaa06c2c82d71d0fbec6c645c899c9dae34fdecc484c93cb9b55b474fe99a646d39067883c740fc76829396dfb40aea4bef1a8d69f5947360ed433638d873b01d24e622624e496a053bf29ce8c7c40aa21c562213256a718217ca52efaf87464ace79cd338611b3cb0949b9a4251", &(0x7f0000000100)=""/13, &(0x7f0000000140)="6ab78e7acdbfd0d0b28126102a8e5684eeaa0455a3e0feca0977b1952367249f150edc52cf62be6939b6aaf58d4ca0e5023e1e5cc41601bcdaf89a616910d6316dc8006f224082fc89fc62cef5e2d1fc4215b9f7b0b8d155884e138badc5a590a136fd42ba93a5dce763359fa17d9b9906f721c9689748b7560b1a94473380376836d7a8067d3cf857ce7cfda0bf51976f3c2bd4fd343a519e1d36bf24da804306854eaac3ea6a925d5c584bb0d49e", &(0x7f0000000200)="cf6268c73e6c45de863b0e64cb6670276812cfdf2a04240d9e125332f1a0959e30914ee35528ce4e457d2e7698b38a662f043f888584a215d216ad87bc0af862d32774fa9c8a3bf65b7859ace95d628695985afe19f2e681c1b50f41a921f1b5cdb7e2c6ffe0bd7801c34246cfcd7d58394cc0a6cf306d0551978b37bb18cf57bb3b8c9b8fb07f7ab30f167a5c66bd9ac1662c0f80eb14aaa2ba8d65c448ef4a55f265c83dd951cd2ecd3686743d1c1e0b9a6d5d6e89104378eadf414c402b44fbbf7dfbb32b172e882ed3d3433fc12179c2f9fe91a27e30f5a4bcffc25d6dabb06cd65339b1e11336e373a88225fc64a9cf85d4", 0x6, r0, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000080)="a94679de969d84d5567672005d47fb5ca945f7bb720fbf00d255547cc31bb6ee42142e007dc522b13599f05a78de585c8d0a63e72073ae7b6c287801c2d99b5104e0614e0897ca213b64ede2c224167b74b9467edf7e3dd8fbba6b9a19925fb4923030256e1ad3ad5950c2ae44e1", &(0x7f0000000340)=""/68}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x5, 0x1606}, 0x48) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000300)={&(0x7f0000000400)="94b14e1a55426c666eff82f0614216adbee9e9f18dd63a4419b31f4cfc58623cbaa06c2c82d71d0fbec6c645c899c9dae34fdecc484c93cb9b55b474fe99a646d39067883c740fc76829396dfb40aea4bef1a8d69f5947360ed433638d873b01d24e622624e496a053bf29ce8c7c40aa21c562213256a718217ca52efaf87464ace79cd338611b3cb0949b9a4251", &(0x7f0000000100)=""/13, &(0x7f0000000140)="6ab78e7acdbfd0d0b28126102a8e5684eeaa0455a3e0feca0977b1952367249f150edc52cf62be6939b6aaf58d4ca0e5023e1e5cc41601bcdaf89a616910d6316dc8006f224082fc89fc62cef5e2d1fc4215b9f7b0b8d155884e138badc5a590a136fd42ba93a5dce763359fa17d9b9906f721c9689748b7560b1a94473380376836d7a8067d3cf857ce7cfda0bf51976f3c2bd4fd343a519e1d36bf24da804306854eaac3ea6a925d5c584bb0d49e", &(0x7f0000000200)="cf6268c73e6c45de863b0e64cb6670276812cfdf2a04240d9e125332f1a0959e30914ee35528ce4e457d2e7698b38a662f043f888584a215d216ad87bc0af862d32774fa9c8a3bf65b7859ace95d628695985afe19f2e681c1b50f41a921f1b5cdb7e2c6ffe0bd7801c34246cfcd7d58394cc0a6cf306d0551978b37bb18cf57bb3b8c9b8fb07f7ab30f167a5c66bd9ac1662c0f80eb14aaa2ba8d65c448ef4a55f265c83dd951cd2ecd3686743d1c1e0b9a6d5d6e89104378eadf414c402b44fbbf7dfbb32b172e882ed3d3433fc12179c2f9fe91a27e30f5a4bcffc25d6dabb06cd65339b1e11336e373a88225fc64a9cf85d4", 0x6, r0, 0x4}, 0x38) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000080)="a94679de969d84d5567672005d47fb5ca945f7bb720fbf00d255547cc31bb6ee42142e007dc522b13599f05a78de585c8d0a63e72073ae7b6c287801c2d99b5104e0614e0897ca213b64ede2c224167b74b9467edf7e3dd8fbba6b9a19925fb4923030256e1ad3ad5950c2ae44e1", &(0x7f0000000340)=""/68}, 0x20) (async) 07:31:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) r4 = gettid() msgctl$IPC_SET(r2, 0x1, &(0x7f0000000680)={{0x0, 0xee00, 0xee00, 0xee01, 0xee00, 0x4c, 0x400}, 0x0, 0x0, 0xca1, 0xed, 0x1ffe000000000, 0x9, 0x1, 0x34eb, 0x7, 0x7, r3, r4}) 07:31:52 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) socketpair(0x1, 0x5, 0x24, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f0000000080)={@any, 0x80200}) 07:31:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="05d301f80300000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0xa, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0xfffff497, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, r4, r1, r6]}, 0x80) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000600000000000000ffef000095000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x91, &(0x7f0000000100)=""/145, 0x40f00, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x0, 0x7fc, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) 07:31:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) gettid() 07:31:53 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:53 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) socketpair(0x1, 0x5, 0x24, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f0000000080)={@any, 0x80200}) 07:31:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000600000000000000ffef000095000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x91, &(0x7f0000000100)=""/145, 0x40f00, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x0, 0x7fc, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) 07:31:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:53 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) socketpair(0x1, 0x5, 0x24, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f0000000080)={@any, 0x80200}) 07:31:53 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x6, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) r3 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) 07:31:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000600000000000000ffef000095000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x91, &(0x7f0000000100)=""/145, 0x40f00, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x0, 0x7fc, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) 07:31:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:54 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) socketpair(0x1, 0x5, 0x24, &(0x7f00000000c0)) 07:31:54 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:31:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:31:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") 07:31:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:31:54 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) 07:31:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, 0x0, 0xca, 0x0, 0x3800) 07:31:54 executing program 4: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async, rerun: 64) socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) (async, rerun: 32) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:31:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:54 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x0) 07:31:54 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:31:54 executing program 4: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:54 executing program 2: ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x4, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000480)={0x0, r0, r1, 0x3, 0x34, 0x5, 0x6, 0x4, 0x7, 0x7fff, 0x119, 0x4}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}, 0x5d000}, {0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, r4, 0x81}}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3f, 0x6, 0x8000, 0x14, r2, 0x80000001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0xd}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 07:31:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) msgget$private(0x0, 0x10) 07:31:54 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r3, r4}}, 0x18) 07:31:54 executing program 2: ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x4, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000480)={0x0, r0, r1, 0x3, 0x34, 0x5, 0x6, 0x4, 0x7, 0x7fff, 0x119, 0x4}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}, 0x5d000}, {0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, r4, 0x81}}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3f, 0x6, 0x8000, 0x14, r2, 0x80000001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0xd}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x4, 0x2, 0x7}) (async) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000480)={0x0, r0, r1, 0x3, 0x34, 0x5, 0x6, 0x4, 0x7, 0x7fff, 0x119, 0x4}) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}, 0x5d000}, {0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, r4, 0x81}}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3f, 0x6, 0x8000, 0x14, r2, 0x80000001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0xd}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) (async) 07:31:54 executing program 4: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 07:31:54 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x0) 07:31:55 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) 07:31:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:55 executing program 2: ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x4, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000480)={0x0, r0, r1, 0x3, 0x34, 0x5, 0x6, 0x4, 0x7, 0x7fff, 0x119, 0x4}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}, 0x5d000}, {0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, r4, 0x81}}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3f, 0x6, 0x8000, 0x14, r2, 0x80000001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0xd}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 07:31:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:55 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:31:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:55 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x0) 07:31:55 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) 07:31:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:55 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xee00}}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0xc5, "a2b53570dbf968bba987ea7e57372e2a58126326b81cc2da779cd263b10623567a913589a3ff70c22a9afd82ccc5be7cc80258295a57c1dad0f025d75ee4f776ef4558289c3313ad22d5bfbcb335ff1a389b762b721d1fb39d6e01e1b4e22830a43fa7fa4b5020e2f87b1bbe1e58bfabfd77763faa61cf7b50b6bba6297e42728603eab0d1708d566689fe24c35ae44a84ba657c224702acc7b24c4a6b2bf0dfd20dd87f4df38c174309703ccc4adc5cb779577e83acca6f854a5d46748393d76eb97456ff"}, &(0x7f0000000080)=0xe9) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xe4, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5184fb321fbdbc87fba91ddefc7edcb3e637ea755ff525da75b27cdfb3823f73a767efd78d700ff0e652200a20253c92576437291239bca8cd0d8ae06d017a11325366fa66f01d01afb62efae3b1b1cc6fea43877a3f3adde048655f4eff9d0ba201130ba586482ebf326f7287a4e697f8feb"}, &(0x7f0000000140)=0x108) 07:31:55 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x3}}, 0x20) 07:31:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:56 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xee00}}) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0xc5, "a2b53570dbf968bba987ea7e57372e2a58126326b81cc2da779cd263b10623567a913589a3ff70c22a9afd82ccc5be7cc80258295a57c1dad0f025d75ee4f776ef4558289c3313ad22d5bfbcb335ff1a389b762b721d1fb39d6e01e1b4e22830a43fa7fa4b5020e2f87b1bbe1e58bfabfd77763faa61cf7b50b6bba6297e42728603eab0d1708d566689fe24c35ae44a84ba657c224702acc7b24c4a6b2bf0dfd20dd87f4df38c174309703ccc4adc5cb779577e83acca6f854a5d46748393d76eb97456ff"}, &(0x7f0000000080)=0xe9) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:56 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}], 0x2, 0x0) 07:31:56 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 07:31:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:31:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:56 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:31:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:31:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:56 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xee00}}) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xee00}}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0xc5, "a2b53570dbf968bba987ea7e57372e2a58126326b81cc2da779cd263b10623567a913589a3ff70c22a9afd82ccc5be7cc80258295a57c1dad0f025d75ee4f776ef4558289c3313ad22d5bfbcb335ff1a389b762b721d1fb39d6e01e1b4e22830a43fa7fa4b5020e2f87b1bbe1e58bfabfd77763faa61cf7b50b6bba6297e42728603eab0d1708d566689fe24c35ae44a84ba657c224702acc7b24c4a6b2bf0dfd20dd87f4df38c174309703ccc4adc5cb779577e83acca6f854a5d46748393d76eb97456ff"}, &(0x7f0000000080)=0xe9) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:56 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}], 0x1, 0x0) 07:31:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:31:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:57 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:31:57 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x9, 0x7, 0x7fffffff, 0x3f, r0, 0x0, '\x00', r1, 0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc214979bbbae3170, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:57 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0), 0x0, 0x0) 07:31:57 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) 07:31:57 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x9, 0x7, 0x7fffffff, 0x3f, r0, 0x0, '\x00', r1, 0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc214979bbbae3170, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:57 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:31:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x9, 0x7, 0x7fffffff, 0x3f, r0, 0x0, '\x00', r1, 0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc214979bbbae3170, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:31:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:57 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0), 0x0, 0x0) 07:31:57 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:57 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) 07:31:57 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000240), 0x8, 0x101080) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x10}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000300)={@any, 0x9}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x1f, 0x4, "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", 0x0, 0x80, 0x6, 0x3f, 0x1, 0xfd, 0x4}, r3}}, 0x120) r4 = socket$inet6(0xa, 0x6, 0x4c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e20, 0xb89, 0x4e20, 0x1, 0xa, 0xa0, 0xa0, 0x39, r5, 0xee01}, {0x0, 0x7, 0x7f, 0x7fffffffffffffff, 0x6, 0x200, 0x8}, {0x4, 0x6, 0x5, 0xfffffffffffffff7}, 0x9, 0x6e6bb3, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d5, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x0, 0x1, 0x0, 0x0, 0x7, 0xc7}}, 0xe8) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x80001) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r7, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000) 07:31:57 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) 07:31:57 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:57 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0), 0x0, 0x0) 07:31:58 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:31:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x72, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170dc8691e46eff92b41df159bb30c92df0fb5cb1f2458031714f00a5386fbae303cda2ea92e74f7928c18676374baa84f2f11c1eb9d2ccbd60ca5"}, &(0x7f0000000140)=0x96) 07:31:58 executing program 0: socketpair(0x0, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:31:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000021c0)=0x14) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:58 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:58 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{0x0}], 0x1, 0x0) 07:31:58 executing program 2: syz_open_dev$audion(&(0x7f0000000240), 0x8, 0x101080) (async) r0 = syz_open_dev$audion(&(0x7f0000000240), 0x8, 0x101080) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x10}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000300)={@any, 0x9}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x1f, 0x4, "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", 0x0, 0x80, 0x6, 0x3f, 0x1, 0xfd, 0x4}, r3}}, 0x120) r4 = socket$inet6(0xa, 0x6, 0x4c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e20, 0xb89, 0x4e20, 0x1, 0xa, 0xa0, 0xa0, 0x39, r5, 0xee01}, {0x0, 0x7, 0x7f, 0x7fffffffffffffff, 0x6, 0x200, 0x8}, {0x4, 0x6, 0x5, 0xfffffffffffffff7}, 0x9, 0x6e6bb3, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d5, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x0, 0x1, 0x0, 0x0, 0x7, 0xc7}}, 0xe8) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r2) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x80001) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x80001) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r7, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000) 07:31:58 executing program 0: socketpair(0x0, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:31:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:58 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:58 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{0x0}], 0x1, 0x0) 07:31:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:58 executing program 0: socketpair(0x0, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:31:58 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000240), 0x8, 0x101080) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x10}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000300)={@any, 0x9}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x1f, 0x4, "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", 0x0, 0x80, 0x6, 0x3f, 0x1, 0xfd, 0x4}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x1f, 0x4, "6d5e27c3ce32fedfe031463715006aa5c7949397507d250987341d1003082b7dcbed72305ae03dd6f89ead8f4ed3ce50dc2b4378ab5516feb6dc83957308acf22103986c619ae923691139ab13f2787fdc0f08c11cf774eddc8d63509afb6d1fa4b3ce81703f3fca92f4d611cd783896dd8efda0772f8f477659732d87aa89e074d620dbdd953db7acce8b4936e2ad556faf68cc431a665bfc952f190949f142495db90a094ee5b676ffc9914d29d4c30d264ddcda183cdd066175b70452f6a629e5a08db385957ed0ef11069ed2695d7769515196c04d16c33b7c4790d0bd2c12a44ed69fb5429e39bfc7063e06c844030872012d22e92a11def7f51f0c7a0b", 0x0, 0x80, 0x6, 0x3f, 0x1, 0xfd, 0x4}, r3}}, 0x120) r4 = socket$inet6(0xa, 0x6, 0x4c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e20, 0xb89, 0x4e20, 0x1, 0xa, 0xa0, 0xa0, 0x39, r5, 0xee01}, {0x0, 0x7, 0x7f, 0x7fffffffffffffff, 0x6, 0x200, 0x8}, {0x4, 0x6, 0x5, 0xfffffffffffffff7}, 0x9, 0x6e6bb3, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d5, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x0, 0x1, 0x0, 0x0, 0x7, 0xc7}}, 0xe8) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e20, 0xb89, 0x4e20, 0x1, 0xa, 0xa0, 0xa0, 0x39, r5, 0xee01}, {0x0, 0x7, 0x7f, 0x7fffffffffffffff, 0x6, 0x200, 0x8}, {0x4, 0x6, 0x5, 0xfffffffffffffff7}, 0x9, 0x6e6bb3, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d5, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x0, 0x1, 0x0, 0x0, 0x7, 0xc7}}, 0xe8) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r2) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x80001) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x80001) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r7, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000) 07:31:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) syz_open_dev$audion(&(0x7f0000000280), 0x10001, 0x84280) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:59 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x39, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd04e0addeed09bce33629e3cbcd62f483d702765f9393eba7a398170d"}, &(0x7f0000000140)=0x5d) 07:31:59 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{0x0}], 0x1, 0x0) 07:31:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2001208}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x100}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000880) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000003c0)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8041, 0x6, 0x7fffffff, 0x58b, r0, 0x10001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x1}, 0x48) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x100, 0x0) 07:31:59 executing program 0: socketpair(0xf, 0x0, 0xfffffffd, &(0x7f0000000000)) 07:31:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:59 executing program 0: socketpair(0xf, 0x0, 0x0, &(0x7f0000000000)) 07:31:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2001208}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x100}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000880) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000003c0)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x2}}, 0x18) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8041, 0x6, 0x7fffffff, 0x58b, r0, 0x10001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x1}, 0x48) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x100, 0x0) 07:31:59 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:59 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:59 executing program 0: socketpair(0xf, 0x0, 0x0, 0x0) 07:31:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0xf03, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:31:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:31:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2001208}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x100}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000880) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000003c0)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8041, 0x6, 0x7fffffff, 0x58b, r0, 0x10001, '\x00', r3, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x1}, 0x48) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x100, 0x0) 07:31:59 executing program 0: socketpair(0xf, 0x0, 0x0, 0x0) 07:31:59 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:31:59 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{0x0}], 0x1, 0x0) 07:32:00 executing program 0: socketpair(0xf, 0x0, 0x0, 0x0) 07:32:00 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000140)=0x24) 07:32:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0xfffffffd, 0x1606}, 0x48) 07:32:00 executing program 0: socketpair(0xf, 0x0, 0x0, 0x0) 07:32:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1d, "353a963c2eea2e4377c6aaed250eaa981c54bb741302e026f2a02fb1dd"}, &(0x7f0000000140)=0x41) 07:32:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0xfffffffd, 0x1606}, 0x48) 07:32:00 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:00 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0), 0x0, 0x0) 07:32:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:00 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0xfffffffd, 0x1606}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0xfffffffd, 0x1606}, 0x48) (async) 07:32:00 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:00 executing program 2: ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}], 0x0, 0x0, '\x00', 0x4, 0x4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:00 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0), 0x0, 0x0) 07:32:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:01 executing program 0: socketpair(0xf, 0x2, 0xfffffffd, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x240001, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:32:01 executing program 2: ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}], 0x0, 0x0, '\x00', 0x4, 0x4}) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}], 0x0, 0x0, '\x00', 0x4, 0x4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0xf, "353a963c2eea2e4377c6aaed250eaa"}, &(0x7f0000000140)=0x33) 07:32:01 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:01 executing program 2: ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}], 0x0, 0x0, '\x00', 0x4, 0x4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:01 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x0) 07:32:01 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:02 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/67) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 07:32:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:02 executing program 3: syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x8, "353a963c2eea2e43"}, &(0x7f0000000140)=0x2c) 07:32:02 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/67) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:02 executing program 1: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:02 executing program 3: syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:02 executing program 0: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "056f65223fb8db86e51c4de054fa36e49419a2b56a2e4e7ee3a27b8bb973d6d5356d4e4a49845f8d11ea028b3cd6d8c46b16909540318f28136b22f1789de30a76141bb000898dec4cd2f6fd8b087a30ad2f9556cf27e004b3978faa0b378443aebb8187e099db3c16c7a3b7eaa2611596883cefeaa489cc5f564d13b009b4213d6933bfd0ad7066dac53ef0a70cf9b383f2a96b6aa85310b943f2bce8df6bce7ab23feb2e4a56175d9ea7f548b21baad11e155eae6d396531b5ae4e01af4d09f8ff2bbfa63689d30fc7b3e186390262ab963d072dd84addeebdb63f31b99031560bbeb5c18d0935136a2cc3d80dbe619f617683ac254d9359cb3d4094e97e86", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{0x0}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, 0x0, 0x0, 0x0) 07:32:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:02 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/67) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:02 executing program 1: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:02 executing program 3: syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:02 executing program 0: syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x4, 0x5, 0x1802, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0xc}, 0x48) 07:32:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x1, '5'}, &(0x7f0000000140)=0x25) 07:32:02 executing program 1: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:02 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef17b49eb1b43020f908a0aa921d7aa13947eed82e507f6b1e60bdcd2242de46a807bc6c1378bc90d6a1d34ebaf85bf1abf1d292ed430f60") process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/54, 0x36}, {&(0x7f0000000540)=""/46, 0x2e}], 0x6, 0x0) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000004c0)=""/75, 0x4b}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) msgget$private(0x0, 0x10) 07:32:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x4, 0x5, 0x1802, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0xc}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x4, 0x5, 0x1802, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0xc}, 0x48) 07:32:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x5, "353a963c2e"}, &(0x7f0000000140)=0x29) 07:32:03 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:03 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x4, 0x5, 0x1802, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0xc}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x4, 0x5, 0x1802, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0xc}, 0x48) (async) 07:32:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:32:03 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, '5:'}, &(0x7f0000000140)=0x26) 07:32:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:32:03 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x2}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:04 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:04 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000140)) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, '5:'}, &(0x7f0000000140)=0x26) 07:32:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_ext={0x1c, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x81b733d62727327c, 0x4, 0x7, 0x82, 0x1}], &(0x7f0000001380)='syzkaller\x00', 0x7, 0x77, &(0x7f00000013c0)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001440)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xe, 0x3f, 0x1ff}, 0x10, 0x444b, 0xffffffffffffffff, 0x0, &(0x7f0000001540)=[r2, r0, r3, r1]}, 0x80) 07:32:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x2}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) 07:32:04 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}], 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, '5:'}, &(0x7f0000000140)=0x26) 07:32:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioprio_get$uid(0x3, 0xee01) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xc6, 0x1, 0x6, 0x1800, 0xffffffffffffffff, 0xfe000000, '\x00', r0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) 07:32:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x18e4, 0x6, 0x200, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x1}, 0x48) 07:32:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "353a963c"}, &(0x7f0000000140)=0x28) 07:32:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 07:32:04 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:04 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}], 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioprio_get$uid(0x3, 0xee01) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xc6, 0x1, 0x6, 0x1800, 0xffffffffffffffff, 0xfe000000, '\x00', r0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) (async) ioprio_get$uid(0x3, 0xee01) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xc6, 0x1, 0x6, 0x1800, 0xffffffffffffffff, 0xfe000000, '\x00', r0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) (async) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, "353a96"}, &(0x7f0000000140)=0x27) 07:32:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 07:32:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:32:04 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}], 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, "353a96"}, &(0x7f0000000140)=0x27) 07:32:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioprio_get$uid(0x3, 0xee01) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xc6, 0x1, 0x6, 0x1800, 0xffffffffffffffff, 0xfe000000, '\x00', r0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) 07:32:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:32:04 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}], 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, "353a96"}, &(0x7f0000000140)=0x27) 07:32:05 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f0000000740), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socketpair(0x6, 0x1, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3f}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000811}, 0x4) 07:32:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001140)={&(0x7f0000001100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "353a963c"}, 0x0) 07:32:05 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000100)=""/31, 0x1f}], 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:05 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) socketpair(0x6, 0x1, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3f}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000811}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) socketpair(0x6, 0x1, 0x3, &(0x7f0000000080)) (async) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3f}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000811}, 0x4) (async) 07:32:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "353a963c"}, 0x0) 07:32:05 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff18300000040000000000000000000000083105007a01000095000000000000005ac3de66d7907e0e7ec0a07af0236af10acd406546c646163affbd7313618e7ff3c25962ac04680e8b5c030000004f3a73ea7f4de7f359bd6041de84a00c5cec59c6df8ba8d1e787c2cb8c43e7578fd59afe45598a4d8a4a15d276ec33554ad1ee5a50ac22ebf7e3fc53e0fd77377574adf7d04f20bdc50cdd0d1ae52f20f617939436fac7abbb290f6dd991b55a3832c25dd1cf8e394cb8a25fc0c463c422eeef164cb8d0f4333921e6050698bea69068139db2dd814bd9daebdd9782292954e445eb8862"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) (async) socketpair(0x6, 0x1, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3f}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000811}, 0x4) 07:32:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "353a963c"}, 0x0) 07:32:05 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x5, "353a963c2e"}, &(0x7f0000000140)=0x29) 07:32:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:05 executing program 1: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x101, 0x1, "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", 0x0, 0xa8, 0x0, 0x5d, 0x0, 0x0, 0x1f, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x0, 0x9, @loopback, 0x80}}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="bac68561f479e41d44b7e6fb205d7a698793ce826b9c7c65b58f134d5714b1ffef") process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, 0x0) r1 = syz_clone(0x1082400, &(0x7f0000000840)="0bdff737d59aa1ca1d8957aaf79c77dae40fc4e516445b7552094b0c2a76548561aa181477c36a1ac6a9bd17f8d65fec", 0x30, 0x0, &(0x7f0000000940), &(0x7f0000000980)) process_vm_readv(r1, &(0x7f0000001dc0)=[{&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000ac0)=""/219, 0xdb}, {&(0x7f0000000bc0)=""/110, 0x6e}, {0x0}, {0x0}], 0x5, &(0x7f00000020c0)=[{&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/166, 0xa6}, {&(0x7f0000002000)=""/162, 0xa2}], 0x3, 0x0) 07:32:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:05 executing program 4: socket$inet6(0xa, 0x80000, 0x407) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) 07:32:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:05 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:06 executing program 1: membarrier(0x1, 0x0) socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) 07:32:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:06 executing program 4: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x110, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x40) socketpair(0xa, 0x6, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xd7f8, 0x6, 0x55, 0x40, 0x5, "31af4d6d44d4d80f007aefaf01663f887026a13c11cf25f42e3dddce12394bbc57c0f4795becf59779748987412fe4b8cffdf0409ec5890247ca810ad81d90b65cc2d1c919940e5615521deac81cf3ca3d5b0a903ec99f987629e639cacdc14b0b34e943c09e12263227321e0899e97eb2852553fdcd5999c184dfc577ecf2c6"}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r2, 0x9}) 07:32:06 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:06 executing program 1: membarrier(0x1, 0x0) socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) 07:32:06 executing program 4: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:06 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:06 executing program 1: membarrier(0x1, 0x0) socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) 07:32:06 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000600)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x1, 0x5, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:07 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {0x0}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:07 executing program 1: socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) 07:32:07 executing program 4: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:07 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:07 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {0x0}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:07 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 07:32:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r2, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:07 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {0x0}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:08 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:08 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 07:32:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff18300000040000000000000000000000083105007a01000095000000000000005ac3de66d7907e0e7ec0a07af0236af10acd406546c646163affbd7313618e7ff3c25962ac04680e8b5c030000004f3a73ea7f4de7f359bd6041de84a00c5cec59c6df8ba8d1e7"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:08 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:08 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000040)) 07:32:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:08 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000040)) 07:32:08 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:09 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000040)) 07:32:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:09 executing program 1: socketpair(0x2a, 0x2, 0x0, 0x0) 07:32:09 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff18300000040000000000000000000000083105007a01000095000000000000005ac3de66d7907e0e"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:09 executing program 1: socketpair(0x2a, 0x2, 0x0, 0x0) 07:32:09 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:10 executing program 1: socketpair(0x2a, 0x2, 0x0, 0x0) 07:32:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:10 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 4: write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:10 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x0) 07:32:10 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff183000000400000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 4: write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="1800"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:10 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x0) 07:32:10 executing program 4: write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="1800"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:10 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x0) 07:32:10 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x0) 07:32:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="1800"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:11 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}], 0x3, 0x0) 07:32:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}], 0x3, 0x0) 07:32:11 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:11 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}], 0x2, 0x0) 07:32:11 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) 07:32:11 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:11 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}], 0x2, 0x0) 07:32:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) 07:32:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff1830"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) 07:32:12 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:12 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}], 0x2, 0x0) 07:32:12 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:12 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {0x0}], 0x3, 0x0) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}, @ib={0x1b, 0x0, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:12 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {0x0}], 0x3, 0x0) 07:32:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}, @ib={0x1b, 0x0, 0x0, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}, @ib={0x1b, 0x0, 0x0, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x0, 0x6}}}, 0x118) 07:32:12 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {0x0}], 0x2, 0x0) 07:32:12 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}, @ib={0x1b, 0x0, 0x0, {"59bd39018f4c45e3b8664d3ee04e47c0"}}}}, 0x118) 07:32:13 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}], 0x1, 0x0) 07:32:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1}}, 0xa0) 07:32:13 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff18"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}], 0x1, 0x0) 07:32:13 executing program 5: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {0x0}], 0x3, 0x0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:13 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}], 0x1, 0x0) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:13 executing program 5: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}], 0x1, 0x0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:13 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2, 0x0) 07:32:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0xa0) 07:32:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @rand_addr=0x64010101}}}, 0xa0) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2, 0x0) 07:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {0x0}}, 0xa0) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 1: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}], 0x3, 0x0) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2, 0x0) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 3: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {&(0x7f0000000080)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x0) 07:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x80000}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x3}}, 0x20) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x20008040) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 07:32:16 executing program 1: socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 1: socketpair(0x0, 0x2, 0x7f, &(0x7f0000000040)) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:16 executing program 1: socketpair(0x0, 0x2, 0x7f, &(0x7f0000000040)) 07:32:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) socket$inet6(0xa, 0x80000, 0x3) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:17 executing program 1: socketpair(0x0, 0x2, 0x7f, &(0x7f0000000040)) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 1: socketpair(0x18, 0x0, 0x7f, &(0x7f0000000040)) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002680)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/233}, {&(0x7f00000002c0)=""/213}, {&(0x7f0000000080)=""/128}, {&(0x7f00000003c0)=""/120}], 0x40, &(0x7f0000002640)=""/22, 0x16}, 0x1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000851000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) sendmsg$nl_route(r1, &(0x7f00000027c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x3}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x80000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000580)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: socketpair(0x18, 0x0, 0x7f, 0x0) 07:32:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000026c0), 0xc502, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: socketpair(0x18, 0x0, 0x7f, 0x0) 07:32:18 executing program 1: socketpair(0x18, 0x0, 0x7f, 0x0) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:18 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:18 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:19 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:19 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, 0x0, 0x20008040) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 07:32:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fc"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:20 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 0: socketpair(0x18, 0x0, 0x0, 0x0) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:20 executing program 0: r0 = syz_clone(0x18003080, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/93, 0x5d}, {0x0}], 0x2, &(0x7f0000000480)=[{&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/130, 0x82}], 0x4, 0x0) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085100000fcffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xa4}}, 0x10) socketpair(0x18, 0x2, 0x7f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3d}}, @ib={0x1b, 0x101, 0x6ca, {"59bd39018f4c45e3b8664d3ee04e47c0"}, 0x3ff, 0x6}}}, 0x118) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:20 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:20 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001d0000032bbd4c00ffdb5f2502000000", @ANYRES32=0x0, @ANYBLOB="4000010814000100fc0400000000000000000000000000010800005ba080c078eb1f2364a9386dd4081af041bad365e9adc2f95854b7a13ae644392f32f0dd4ec72dd7e124342ade73d7e71acaf6cd1f418706e54d415a759c73e64724aa003af4f92a2548854cf3"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r2}}, 0x18) 07:32:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "597b1ee5efed3d8fe2300ecd468a404b00f76c4024123536618b85cb3f84770250fc4a827a04b1edb40feb14760d41f248295edcdd4bf855cc1287b9f1cf1689adac236cb4ff59ebf19d8ac817dcc67e6cf83dc6e3c38d33c0d1cbf46df1af77ac9fef5ac1ec4b1c44ff2c5dc3678c7d8f4e04bfd5509a16fe79e4de1a3f77725b7091b6abe0d8d7ac52514b18014cb18492a5079524e2e0faed81ea84177c8be8ee58e0e0cb72ab09cdec6a01239f0bee021fe16abc8b914c0fdd3cff63dfb39c584bf5ac62c803f6364efc531035212eb7360f2830bd9c937ff62215921a259cfadc4094df6f8f1e7f5597fe117a143b4bd5dceb92abd0e3651ed9260e6d15"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "597b1ee5efed3d8fe2300ecd468a404b00f76c4024123536618b85cb3f84770250fc4a827a04b1edb40feb14760d41f248295edcdd4bf855cc1287b9f1cf1689adac236cb4ff59ebf19d8ac817dcc67e6cf83dc6e3c38d33c0d1cbf46df1af77ac9fef5ac1ec4b1c44ff2c5dc3678c7d8f4e04bfd5509a16fe79e4de1a3f77725b7091b6abe0d8d7ac52514b18014cb18492a5079524e2e0faed81ea84177c8be8ee58e0e0cb72ab09cdec6a01239f0bee021fe16abc8b914c0fdd3cff63dfb39c584bf5ac62c803f6364efc531035212eb7360f2830bd9c937ff62215921a259cfadc4094df6f8f1e7f5597fe117a143b4bd5dceb92abd0e3651ed9260e6d15"}}, 0x110) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r2, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r2, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) 07:32:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:21 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r1, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) 07:32:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r1, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) 07:32:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 5: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 5: times(&(0x7f0000000140)) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 0: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x20008040) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a00000000000000009000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 5: socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 0: times(&(0x7f0000000140)) 07:32:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:22 executing program 5: socketpair(0x0, 0x80000, 0x8, &(0x7f0000000080)) 07:32:22 executing program 2: times(&(0x7f0000000140)) socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180), 0xd5, 0x521000) socketpair(0x6, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000580)={r0, r3, 0x8, 0xb3, &(0x7f00000004c0)="1e71f3279de53b85e711232bebc531d36e978bed000e42b9666a018dc49f56d36400afdfa2455f319a9b8a3ced7dfa854b7f48ca2e4cc7a2b915076c15c48e236f4d81024d29e55a204ed0da08abef40f2c3c38f2f52297b77dda5610feca415b6de7e8f2a1513ce3469df21281ab9aaecab3c3adfbfcd898e9582cb5d7791a6afd1c1596d03907dcf3cb8c5c76c30141853f8c9216ff9b1716291b0492a19f409041352e6c84f0517e737ccfb1f65e119031d", 0x2, 0x3, 0x80, 0x101, 0x0, 0x0, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x80, "ce7cc6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:32:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x20008040) 07:32:23 executing program 0: times(0x0) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 07:32:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a000000000000000090000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 0: times(0x0) 07:32:23 executing program 5: socketpair(0x0, 0x80000, 0x8, &(0x7f0000000080)) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], 0x0, 0x8, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 2: times(0x0) 07:32:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 0: times(0x0) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 2: times(0x0) [ 1059.651356][ T1233] ieee802154 phy0 wpan0: encryption failed: -22 [ 1059.657773][ T1233] ieee802154 phy1 wpan1: encryption failed: -22 07:32:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:23 executing program 5: socketpair(0x0, 0x80000, 0x8, &(0x7f0000000080)) 07:32:23 executing program 2: times(0x0) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 5: socketpair(0x6, 0x0, 0x8, &(0x7f0000000080)) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 5: socketpair(0x6, 0x0, 0x0, &(0x7f0000000080)) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 5: socketpair(0x6, 0x0, 0x0, 0x0) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 5: socketpair(0x6, 0x0, 0x0, 0x0) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x4, 0xc, 0x5, 0x9}, 0x10}, 0x80) 07:32:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="18000000a0000000000000000900000085"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:23 executing program 5: socketpair(0x6, 0x0, 0x0, 0x0) 07:32:33 executing program 3: socketpair(0x0, 0x80000, 0x8, &(0x7f0000000080)) 07:32:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0xc0000, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) read$rfkill(r2, &(0x7f00000000c0), 0x8) 07:32:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0xc0000, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) read$rfkill(r2, &(0x7f00000000c0), 0x8) 07:32:33 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x90000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) socketpair(0xa, 0xa, 0x7ff, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0xffffffffffffff06) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3}) socketpair(0x8, 0x3, 0x2, &(0x7f0000000440)) 07:32:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=""/250, 0xfa}, 0x2) 07:32:33 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r1, 0x4}) 07:32:34 executing program 4: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r1, 0x4}) 07:32:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x90000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) socketpair(0xa, 0xa, 0x7ff, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0xffffffffffffff06) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0xffffffffffffffff}) socketpair(0x8, 0x3, 0x2, &(0x7f0000000440)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18390002050000ee00007cbc2000000000e2fff61900004c330a171a6389992af9dd03000000007fffffff55d4ec56418edcead5ccaa2f2dec790881c8f9eb5db407ee6517e7199ab1809b5cfcdf82c3f39505f46493af9412ca6e715d72e80c46f78405576eaadbc607d924963b06bd9fe1910d2824f84d4fc5508c8e34c688b02c344ff8871add1c27fe78642574d1bea4812370fab9a3bb1dc079522e1727d338d31e0c87f997219af34f37ab74e233c34fdeaed0c1ee2215307c2788802ac2271134fdb5d209ad270b749441187cf32514d971a6861233e01468e9b0d3ee2ea159c4402bf233f2958b", @ANYRES32=r4, @ANYBLOB='\ta\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000280)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x1, 0x5, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r1, r1, r3, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) 07:32:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=""/250, 0xfa}, 0x2) 07:32:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x90000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) socketpair(0xa, 0xa, 0x7ff, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0xffffffffffffff06) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3}) socketpair(0x8, 0x3, 0x2, &(0x7f0000000440)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x80000001, 0x1, 0xff, 0x944, r1, 0x96c, '\x00', 0x0, r1, 0x4, 0x5, 0x3, 0x6}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x3, 0x480602) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) 07:32:34 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r1, 0x4}) 07:32:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x46, 0x0, 0x0) 07:32:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, 0x0) 07:32:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=""/250, 0xfa}, 0x2) 07:32:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x42, 0x0, 0x0) 07:32:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3e, 0x0, 0x0) 07:32:34 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r1, 0x4}) 07:32:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x46, 0x0, 0x0) 07:32:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, 0x0) 07:32:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3e, 0x0, 0x0) 07:32:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x42, 0x0, 0x0) 07:32:34 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)) socket$inet_udp(0x2, 0x2, 0x0) 07:32:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x46, 0x0, 0x0) 07:32:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3e, 0x0, 0x0) 07:32:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, 0x0) 07:32:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x42, 0x0, 0x0) 07:32:34 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)) 07:32:34 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:34 executing program 2: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:34 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:34 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:34 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:34 executing program 2: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:34 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:34 executing program 5: socketpair(0x25, 0x800, 0xfffffffb, &(0x7f0000000040)) 07:32:35 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:35 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:35 executing program 5: socketpair(0x0, 0x800, 0xfffffffb, &(0x7f0000000040)) 07:32:35 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:35 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:35 executing program 2: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:35 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:35 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:35 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:35 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:35 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:35 executing program 5: socketpair(0x0, 0x800, 0xfffffffb, &(0x7f0000000040)) 07:32:35 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:35 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:35 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:35 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) 07:32:35 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:35 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:35 executing program 5: socketpair(0x0, 0x800, 0xfffffffb, &(0x7f0000000040)) 07:32:35 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:35 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0xfffffd7e) 07:32:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 07:32:35 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) 07:32:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) 07:32:35 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) 07:32:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 07:32:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000000)) 07:32:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x38, 0x0, 0x0) 07:32:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x36, 0x0, 0x0) 07:32:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x35, 0x0, 0x0) 07:32:35 executing program 5: socketpair(0x25, 0x0, 0xfffffffb, &(0x7f0000000040)) 07:32:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000000)) 07:32:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 5: socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)) 07:32:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x35, 0x0, 0x0) 07:32:36 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r0, 0x0, 0x0) 07:32:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 5: socketpair(0x25, 0x0, 0x0, 0x0) 07:32:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x35, 0x0, 0x0) 07:32:36 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000000)) 07:32:36 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 5: socketpair(0x25, 0x0, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 07:32:36 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:36 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 5: socketpair(0x25, 0x0, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 07:32:36 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:36 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 07:32:36 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 07:32:36 executing program 5: bpf$MAP_CREATE(0x22, 0x0, 0x0) 07:32:36 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:36 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:36 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:36 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:36 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:36 executing program 5: bpf$MAP_CREATE(0x22, 0x0, 0x0) 07:32:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:37 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:37 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:37 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:37 executing program 5: bpf$MAP_CREATE(0x22, 0x0, 0x0) 07:32:37 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 07:32:37 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:37 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) 07:32:37 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 07:32:37 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 07:32:37 executing program 3: bpf$MAP_CREATE(0x1c, 0x0, 0x0) 07:32:37 executing program 4: bpf$MAP_CREATE(0x23, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:37 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:32:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 07:32:37 executing program 1: bpf$MAP_CREATE(0x21, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 4: bpf$MAP_CREATE(0x23, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 3: bpf$MAP_CREATE(0x1c, 0x0, 0x0) 07:32:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 07:32:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2b, 0x0, 0x0) 07:32:37 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:37 executing program 4: bpf$MAP_CREATE(0x23, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 1: bpf$MAP_CREATE(0x21, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 3: bpf$MAP_CREATE(0x1c, 0x0, 0x0) 07:32:37 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2b, 0x0, 0x0) 07:32:37 executing program 1: bpf$MAP_CREATE(0x21, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 4: bpf$MAP_CREATE(0x23, 0x0, 0x0) 07:32:37 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) 07:32:37 executing program 3: bpf$MAP_CREATE(0x1e, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:37 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2b, 0x0, 0x0) 07:32:37 executing program 4: bpf$MAP_CREATE(0x23, 0x0, 0x0) 07:32:37 executing program 1: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:37 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:38 executing program 1: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:38 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 4: bpf$MAP_CREATE(0x23, 0x0, 0x0) 07:32:38 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:38 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 4: bpf$MAP_CREATE(0x23, &(0x7f0000000000), 0x48) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:38 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:38 executing program 1: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:38 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 4: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:38 executing program 1: bpf$MAP_CREATE(0x21, &(0x7f0000000000), 0x48) 07:32:38 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:38 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 4: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 07:32:38 executing program 1: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 4: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:38 executing program 5: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 1: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) 07:32:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x21, 0x0, 0x0) 07:32:38 executing program 5: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:38 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000), 0x48) 07:32:38 executing program 3: bpf$MAP_CREATE(0x1e, &(0x7f0000000000), 0x48) 07:32:38 executing program 1: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1e, 0x0, 0x0) 07:32:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 1: bpf$MAP_CREATE(0x14, 0x0, 0x0) 07:32:39 executing program 3: bpf$MAP_CREATE(0x12, 0x0, 0x0) 07:32:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:39 executing program 1: bpf$MAP_CREATE(0x14, 0x0, 0x0) 07:32:39 executing program 3: bpf$MAP_CREATE(0x12, 0x0, 0x0) 07:32:39 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:39 executing program 1: bpf$MAP_CREATE(0x14, 0x0, 0x0) 07:32:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 3: bpf$MAP_CREATE(0x12, 0x0, 0x0) 07:32:39 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1b, 0x0, 0x0) 07:32:39 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:39 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1a, 0x0, 0x0) 07:32:39 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x17, 0x0, 0x0) 07:32:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1b, 0x0, 0x0) 07:32:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1a, 0x0, 0x0) 07:32:39 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:39 executing program 5: bpf$MAP_CREATE(0x17, 0x0, 0x0) 07:32:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1b, 0x0, 0x0) 07:32:39 executing program 2: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1a, 0x0, 0x0) 07:32:39 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:39 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x17, 0x0, 0x0) 07:32:40 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:40 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:40 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 07:32:40 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000000), 0x48) 07:32:40 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x16, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1e, 0x0, 0x0) 07:32:40 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:40 executing program 4: socketpair(0xa, 0x7ffff, 0x0, &(0x7f0000000000)) 07:32:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1d, 0x0, 0x0) 07:32:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x19, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x16, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:40 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 4: socketpair(0xa, 0x7ffff, 0x0, &(0x7f0000000000)) 07:32:40 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x19, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x16, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 4: socketpair(0xa, 0x7ffff, 0x0, &(0x7f0000000000)) 07:32:40 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:40 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x19, 0x0, 0x0) 07:32:40 executing program 4: socketpair(0x0, 0x7ffff, 0x0, &(0x7f0000000000)) 07:32:40 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) 07:32:40 executing program 5: bpf$MAP_CREATE(0x16, 0x0, 0x0) 07:32:40 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:40 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:40 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:40 executing program 5: bpf$MAP_CREATE(0x16, 0x0, 0x0) 07:32:40 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x18, 0x0, 0x0) 07:32:40 executing program 2: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:40 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) 07:32:41 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:41 executing program 5: bpf$MAP_CREATE(0x16, 0x0, 0x0) 07:32:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 2: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:41 executing program 3: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:41 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:41 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 5: bpf$MAP_CREATE(0x16, &(0x7f0000000000), 0x48) 07:32:41 executing program 2: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:41 executing program 3: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:41 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x17, 0x0, 0x0) 07:32:41 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000), 0x48) 07:32:41 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:41 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:41 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 3: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x17, 0x0, 0x0) 07:32:41 executing program 2: socketpair(0xa, 0xe, 0x0, &(0x7f0000000000)) 07:32:41 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) 07:32:41 executing program 4: socketpair(0x0, 0x7ffff, 0x0, 0x0) 07:32:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x17, 0x0, 0x0) 07:32:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x16, 0x0, 0x0) 07:32:41 executing program 2: socketpair(0xa, 0xe, 0x0, &(0x7f0000000000)) 07:32:41 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:41 executing program 4: bpf$MAP_CREATE(0xd, 0x0, 0x0) 07:32:41 executing program 2: socketpair(0xa, 0xe, 0x0, &(0x7f0000000000)) 07:32:41 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x16, 0x0, 0x0) 07:32:41 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:41 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:42 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:42 executing program 2: socketpair(0x0, 0xe, 0x0, &(0x7f0000000000)) 07:32:42 executing program 4: bpf$MAP_CREATE(0xd, 0x0, 0x0) 07:32:42 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) 07:32:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:42 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:42 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:42 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:42 executing program 4: bpf$MAP_CREATE(0xd, 0x0, 0x0) 07:32:42 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:42 executing program 0: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:42 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x13, 0x0, 0x0) 07:32:42 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:42 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:42 executing program 0: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:42 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x13, 0x0, 0x0) 07:32:42 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 07:32:42 executing program 1: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:42 executing program 0: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x13, 0x0, 0x0) 07:32:42 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 5: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:42 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:32:42 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:42 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000000), 0x48) 07:32:42 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:42 executing program 1: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:42 executing program 5: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:43 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:43 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 07:32:43 executing program 1: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:43 executing program 2: socketpair(0x0, 0xe, 0x0, 0x0) 07:32:43 executing program 5: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:43 executing program 0: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:43 executing program 4: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:43 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000000), 0x48) 07:32:43 executing program 2: socketpair(0x0, 0xe, 0x0, 0x0) 07:32:43 executing program 3: bpf$MAP_CREATE(0x10, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:43 executing program 0: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:43 executing program 5: bpf$MAP_CREATE(0x9, 0x0, 0x0) 07:32:43 executing program 0: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:43 executing program 2: socketpair(0x0, 0xe, 0x0, 0x0) 07:32:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 07:32:43 executing program 3: bpf$MAP_CREATE(0x10, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:43 executing program 0: bpf$MAP_CREATE(0xa, 0x0, 0x0) 07:32:43 executing program 5: bpf$MAP_CREATE(0x9, 0x0, 0x0) 07:32:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 07:32:43 executing program 2: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 07:32:43 executing program 0: bpf$MAP_CREATE(0xa, 0x0, 0x0) 07:32:43 executing program 3: bpf$MAP_CREATE(0x10, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 07:32:43 executing program 5: bpf$MAP_CREATE(0x9, 0x0, 0x0) 07:32:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:43 executing program 0: bpf$MAP_CREATE(0xa, 0x0, 0x0) 07:32:43 executing program 3: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:43 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:43 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x11, 0x0, 0x0) 07:32:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x13, 0x0, 0x0) 07:32:44 executing program 2: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 07:32:44 executing program 3: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:44 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:44 executing program 4: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x11, 0x0, 0x0) 07:32:44 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:44 executing program 3: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:44 executing program 4: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x11, 0x0, 0x0) 07:32:44 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:44 executing program 2: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 07:32:44 executing program 3: bpf$MAP_CREATE(0x10, &(0x7f0000000000), 0x48) 07:32:44 executing program 4: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:44 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:44 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:44 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:44 executing program 3: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:44 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:44 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:44 executing program 2: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 07:32:44 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:44 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:44 executing program 3: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:44 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000000), 0x48) 07:32:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x10, 0x0, 0x0) 07:32:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x10, 0x0, 0x0) 07:32:44 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:45 executing program 3: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:45 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 3: bpf$MAP_CREATE(0xc, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:45 executing program 2: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 07:32:45 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:45 executing program 4: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x10, 0x0, 0x0) 07:32:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 3: bpf$MAP_CREATE(0xc, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:45 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 07:32:45 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:45 executing program 4: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 3: bpf$MAP_CREATE(0xc, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:45 executing program 0: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 2: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 07:32:45 executing program 4: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:45 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 3: bpf$MAP_CREATE(0xc, 0x0, 0x0) 07:32:45 executing program 0: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:45 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000000), 0x48) 07:32:45 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 0: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x8, 0x0, 0x0) 07:32:45 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:45 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:32:45 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x0) 07:32:45 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:45 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:46 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x0) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:46 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0x0) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:46 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:32:46 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x0) 07:32:46 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:46 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:46 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:46 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) 07:32:46 executing program 4: socketpair(0x2, 0x2, 0x0, &(0x7f0000000000)) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:46 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:32:46 executing program 5: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:46 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:46 executing program 4: socketpair(0x2, 0x2, 0x0, &(0x7f0000000000)) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:46 executing program 5: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:46 executing program 4: socketpair(0x2, 0x2, 0x0, &(0x7f0000000000)) 07:32:46 executing program 1: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:46 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000000), 0x48) 07:32:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) 07:32:47 executing program 2: socketpair(0xa, 0x3, 0x0, 0x0) 07:32:47 executing program 5: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:47 executing program 1: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:47 executing program 0: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:47 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000000)) 07:32:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x5, 0x0, 0x0) 07:32:47 executing program 1: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:47 executing program 0: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:47 executing program 2: socketpair(0xa, 0x3, 0x0, 0x0) 07:32:47 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x5, 0x0, 0x0) 07:32:47 executing program 0: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:47 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000000)) 07:32:47 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000000), 0x48) 07:32:47 executing program 2: socketpair(0xa, 0x3, 0x0, 0x0) 07:32:47 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4, 0x0, 0x0) 07:32:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x5, 0x0, 0x0) 07:32:47 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:47 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:47 executing program 1: bpf$MAP_CREATE(0x2, 0x0, 0x0) 07:32:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4, 0x0, 0x0) 07:32:47 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:47 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000000)) 07:32:47 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:47 executing program 5: bpf$MAP_CREATE(0x6, 0x0, 0x0) 07:32:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4, 0x0, 0x0) 07:32:47 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:47 executing program 1: bpf$MAP_CREATE(0x2, 0x0, 0x0) 07:32:47 executing program 5: bpf$MAP_CREATE(0x6, 0x0, 0x0) 07:32:47 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:48 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:48 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000000)) 07:32:48 executing program 1: bpf$MAP_CREATE(0x2, 0x0, 0x0) 07:32:48 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 2: bpf$MAP_CREATE(0x5, 0x0, 0x0) 07:32:48 executing program 5: bpf$MAP_CREATE(0x6, 0x0, 0x0) 07:32:48 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:48 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000000), 0x48) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:48 executing program 2: bpf$MAP_CREATE(0x5, 0x0, 0x0) 07:32:48 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000000)) 07:32:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:48 executing program 2: bpf$MAP_CREATE(0x5, 0x0, 0x0) 07:32:48 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 07:32:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:32:48 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000), 0x48) 07:32:48 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 07:32:48 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000000)) 07:32:48 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:32:48 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 07:32:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:48 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 07:32:48 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:49 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 4: socketpair(0x2, 0x2, 0x0, 0x0) 07:32:49 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1606}, 0x48) 07:32:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:49 executing program 5: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) 07:32:49 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 4: socketpair(0x2, 0x2, 0x0, 0x0) 07:32:49 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000300), &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) 07:32:49 executing program 4: socketpair(0x2, 0x2, 0x0, 0x0) 07:32:49 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) 07:32:49 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000300), &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:32:49 executing program 3: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) 07:32:49 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) 07:32:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (fail_nth: 1) 07:32:49 executing program 0: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:32:49 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000300), &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:49 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) 07:32:50 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:32:50 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (fail_nth: 1) [ 1086.238729][T18838] FAULT_INJECTION: forcing a failure. [ 1086.238729][T18838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.295922][T18838] CPU: 1 PID: 18838 Comm: syz-executor.5 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1086.305906][T18838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1086.316114][T18838] Call Trace: [ 1086.319441][T18838] [ 1086.322419][T18838] dump_stack_lvl+0x136/0x150 [ 1086.327181][T18838] should_fail_ex+0x4a3/0x5b0 [ 1086.331941][T18838] _copy_to_user+0x30/0xc0 [ 1086.336457][T18838] simple_read_from_buffer+0xd0/0x160 07:32:50 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) [ 1086.341920][T18838] proc_fail_nth_read+0x191/0x220 [ 1086.347121][T18838] ? proc_fault_inject_read+0x230/0x230 [ 1086.352752][T18838] ? xfs_bmap_insert_extents+0x171/0x830 [ 1086.358508][T18838] ? trace_contention_end+0xd8/0x100 [ 1086.363989][T18838] vfs_read+0x1db/0x910 [ 1086.368226][T18838] ? proc_fault_inject_read+0x230/0x230 [ 1086.373894][T18838] ? kernel_read+0x1b0/0x1b0 [ 1086.378612][T18838] ? receive_fd+0x110/0x110 [ 1086.383195][T18838] ? __fget_files+0x261/0x470 [ 1086.387993][T18838] ksys_read+0x122/0x250 [ 1086.392310][T18838] ? vfs_write+0xde0/0xde0 [ 1086.396921][T18838] ? syscall_enter_from_user_mode+0x26/0x80 [ 1086.402911][T18838] do_syscall_64+0x39/0xb0 [ 1086.407382][T18838] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1086.413319][T18838] RIP: 0033:0x7fe40c63e09c [ 1086.417828][T18838] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1086.437470][T18838] RSP: 002b:00007fe40d463160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 07:32:50 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:50 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) [ 1086.445918][T18838] RAX: ffffffffffffffda RBX: 00007fe40c7abf80 RCX: 00007fe40c63e09c [ 1086.454005][T18838] RDX: 000000000000000f RSI: 00007fe40d4631e0 RDI: 0000000000000004 [ 1086.462003][T18838] RBP: 00007fe40d4631d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.469998][T18838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1086.477995][T18838] R13: 00007ffebdf845cf R14: 00007fe40d463300 R15: 0000000000022000 [ 1086.486013][T18838] 07:32:50 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:50 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) [ 1086.542422][T18848] FAULT_INJECTION: forcing a failure. [ 1086.542422][T18848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.569924][T18848] CPU: 1 PID: 18848 Comm: syz-executor.2 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1086.579918][T18848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 07:32:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) [ 1086.590038][T18848] Call Trace: [ 1086.593364][T18848] [ 1086.596349][T18848] dump_stack_lvl+0x136/0x150 [ 1086.601106][T18848] should_fail_ex+0x4a3/0x5b0 [ 1086.605860][T18848] _copy_from_user+0x30/0xf0 [ 1086.610561][T18848] __sys_bpf+0x1d0/0x54a0 [ 1086.614961][T18848] ? ksys_write+0x207/0x250 [ 1086.619555][T18848] ? lock_downgrade+0x690/0x690 [ 1086.624510][T18848] ? bpf_perf_link_attach+0x520/0x520 [ 1086.629968][T18848] ? vfs_write+0x151/0xde0 [ 1086.634467][T18848] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 1086.640189][T18848] ? wait_for_completion_io_timeout+0x20/0x20 [ 1086.646373][T18848] ? fput+0x2f/0x1a0 [ 1086.650356][T18848] ? ksys_write+0x19a/0x250 [ 1086.654951][T18848] __x64_sys_bpf+0x79/0xc0 [ 1086.659457][T18848] ? syscall_enter_from_user_mode+0x26/0x80 [ 1086.665456][T18848] do_syscall_64+0x39/0xb0 [ 1086.669955][T18848] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1086.675926][T18848] RIP: 0033:0x7fc92128c389 07:32:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x3, 0x0, 0x0) [ 1086.680409][T18848] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1086.700091][T18848] RSP: 002b:00007fc921fbb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1086.708587][T18848] RAX: ffffffffffffffda RBX: 00007fc9213abf80 RCX: 00007fc92128c389 [ 1086.716626][T18848] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000003 [ 1086.724748][T18848] RBP: 00007fc921fbb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.732792][T18848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1086.740818][T18848] R13: 00007ffd13d0eb6f R14: 00007fc921fbb300 R15: 0000000000022000 [ 1086.748865][T18848] 07:32:50 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (fail_nth: 1) 07:32:50 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:32:50 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) 07:32:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:50 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (fail_nth: 2) 07:32:50 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:32:50 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1086.909768][T18866] FAULT_INJECTION: forcing a failure. [ 1086.909768][T18866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.969019][T18866] CPU: 0 PID: 18866 Comm: syz-executor.4 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1086.979095][T18866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1086.989458][T18866] Call Trace: [ 1086.992864][T18866] [ 1086.995829][T18866] dump_stack_lvl+0x136/0x150 [ 1087.000561][T18866] should_fail_ex+0x4a3/0x5b0 [ 1087.005282][T18866] _copy_from_user+0x30/0xf0 [ 1087.009924][T18866] __sys_bpf+0x1d0/0x54a0 [ 1087.014378][T18866] ? ksys_write+0x207/0x250 [ 1087.018920][T18866] ? lock_downgrade+0x690/0x690 [ 1087.023823][T18866] ? bpf_perf_link_attach+0x520/0x520 [ 1087.029238][T18866] ? vfs_write+0x151/0xde0 [ 1087.033697][T18866] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 1087.039382][T18866] ? wait_for_completion_io_timeout+0x20/0x20 [ 1087.045518][T18866] ? fput+0x2f/0x1a0 [ 1087.049451][T18866] ? ksys_write+0x19a/0x250 [ 1087.054153][T18866] __x64_sys_bpf+0x79/0xc0 [ 1087.058604][T18866] ? syscall_enter_from_user_mode+0x26/0x80 [ 1087.064567][T18866] do_syscall_64+0x39/0xb0 [ 1087.069024][T18866] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1087.074983][T18866] RIP: 0033:0x7f457408c389 [ 1087.079431][T18866] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1087.099172][T18866] RSP: 002b:00007f4574d2f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1087.107625][T18866] RAX: ffffffffffffffda RBX: 00007f45741abf80 RCX: 00007f457408c389 07:32:50 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:32:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4, 0x0, 0x0) [ 1087.115710][T18866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1087.123708][T18866] RBP: 00007f4574d2f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.131711][T18866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.139723][T18866] R13: 00007fff93d9ab9f R14: 00007f4574d2f300 R15: 0000000000022000 [ 1087.147773][T18866] [ 1087.161587][T18875] FAULT_INJECTION: forcing a failure. 07:32:50 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) [ 1087.161587][T18875] name fail_usercopy, interval 1, probability 0, space 0, times 0 07:32:50 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (fail_nth: 2) [ 1087.282665][T18875] CPU: 1 PID: 18875 Comm: syz-executor.2 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1087.292668][T18875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1087.302782][T18875] Call Trace: [ 1087.306139][T18875] [ 1087.309121][T18875] dump_stack_lvl+0x136/0x150 [ 1087.313894][T18875] should_fail_ex+0x4a3/0x5b0 [ 1087.318651][T18875] _copy_to_user+0x30/0xc0 [ 1087.323248][T18875] simple_read_from_buffer+0xd0/0x160 [ 1087.328703][T18875] proc_fail_nth_read+0x191/0x220 [ 1087.333828][T18875] ? proc_fault_inject_read+0x230/0x230 [ 1087.339469][T18875] ? xfs_bmap_insert_extents+0x171/0x830 [ 1087.345173][T18875] ? trace_contention_end+0xd8/0x100 [ 1087.350542][T18875] vfs_read+0x1db/0x910 [ 1087.354781][T18875] ? proc_fault_inject_read+0x230/0x230 [ 1087.360521][T18875] ? kernel_read+0x1b0/0x1b0 [ 1087.365188][T18875] ? receive_fd+0x110/0x110 [ 1087.369872][T18875] ? __fget_files+0x261/0x470 [ 1087.374650][T18875] ksys_read+0x122/0x250 [ 1087.378972][T18875] ? vfs_write+0xde0/0xde0 [ 1087.383472][T18875] ? syscall_enter_from_user_mode+0x26/0x80 [ 1087.389484][T18875] do_syscall_64+0x39/0xb0 [ 1087.394060][T18875] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1087.400027][T18875] RIP: 0033:0x7fc92123e09c [ 1087.404495][T18875] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1087.424167][T18875] RSP: 002b:00007fc921fbb160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 07:32:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (fail_nth: 1) 07:32:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x5, 0x0, 0x0) 07:32:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (fail_nth: 1) 07:32:51 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0x5, 0x1ff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1087.432639][T18875] RAX: ffffffffffffffda RBX: 00007fc9213abf80 RCX: 00007fc92123e09c [ 1087.440659][T18875] RDX: 000000000000000f RSI: 00007fc921fbb1e0 RDI: 0000000000000003 [ 1087.448859][T18875] RBP: 00007fc921fbb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.456860][T18875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.464866][T18875] R13: 00007ffd13d0eb6f R14: 00007fc921fbb300 R15: 0000000000022000 [ 1087.473143][T18875] [ 1087.509028][T18885] FAULT_INJECTION: forcing a failure. [ 1087.509028][T18885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.524548][T18888] FAULT_INJECTION: forcing a failure. [ 1087.524548][T18888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.545351][T18890] FAULT_INJECTION: forcing a failure. [ 1087.545351][T18890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.558663][T18885] CPU: 1 PID: 18885 Comm: syz-executor.4 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1087.568634][T18885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1087.578926][T18885] Call Trace: [ 1087.582275][T18885] [ 1087.585266][T18885] dump_stack_lvl+0x136/0x150 [ 1087.594203][T18885] should_fail_ex+0x4a3/0x5b0 [ 1087.598961][T18885] _copy_to_user+0x30/0xc0 [ 1087.603478][T18885] simple_read_from_buffer+0xd0/0x160 07:32:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x6, 0x0, 0x0) [ 1087.608939][T18885] proc_fail_nth_read+0x191/0x220 [ 1087.614137][T18885] ? proc_fault_inject_read+0x230/0x230 [ 1087.619762][T18885] ? xfs_bmap_insert_extents+0x171/0x830 [ 1087.625518][T18885] ? trace_contention_end+0xd8/0x100 [ 1087.630892][T18885] vfs_read+0x1db/0x910 [ 1087.635130][T18885] ? proc_fault_inject_read+0x230/0x230 [ 1087.640763][T18885] ? kernel_read+0x1b0/0x1b0 [ 1087.645400][T18885] ? receive_fd+0x110/0x110 [ 1087.650061][T18885] ? __fget_files+0x261/0x470 [ 1087.654917][T18885] ksys_read+0x122/0x250 07:32:51 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) 07:32:51 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1087.659240][T18885] ? vfs_write+0xde0/0xde0 [ 1087.663732][T18885] ? syscall_enter_from_user_mode+0x26/0x80 [ 1087.669808][T18885] do_syscall_64+0x39/0xb0 [ 1087.674300][T18885] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1087.680298][T18885] RIP: 0033:0x7f457403e09c [ 1087.684782][T18885] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1087.704466][T18885] RSP: 002b:00007f4574d2f160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1087.712952][T18885] RAX: ffffffffffffffda RBX: 00007f45741abf80 RCX: 00007f457403e09c [ 1087.720997][T18885] RDX: 000000000000000f RSI: 00007f4574d2f1e0 RDI: 0000000000000003 [ 1087.729202][T18885] RBP: 00007f4574d2f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.737242][T18885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.745276][T18885] R13: 00007fff93d9ab9f R14: 00007f4574d2f300 R15: 0000000000022000 [ 1087.753343][T18885] [ 1087.758563][T18888] CPU: 0 PID: 18888 Comm: syz-executor.3 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1087.768542][T18888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1087.778837][T18888] Call Trace: [ 1087.782152][T18888] [ 1087.785139][T18888] dump_stack_lvl+0x136/0x150 [ 1087.789937][T18888] should_fail_ex+0x4a3/0x5b0 [ 1087.794705][T18888] _copy_to_user+0x30/0xc0 [ 1087.799209][T18888] simple_read_from_buffer+0xd0/0x160 [ 1087.804659][T18888] proc_fail_nth_read+0x191/0x220 [ 1087.809769][T18888] ? proc_fault_inject_read+0x230/0x230 [ 1087.815376][T18888] ? xfs_bmap_insert_extents+0x171/0x830 [ 1087.821139][T18888] ? trace_contention_end+0xd8/0x100 [ 1087.826505][T18888] vfs_read+0x1db/0x910 [ 1087.830714][T18888] ? proc_fault_inject_read+0x230/0x230 [ 1087.836316][T18888] ? kernel_read+0x1b0/0x1b0 [ 1087.840949][T18888] ? receive_fd+0x110/0x110 [ 1087.845493][T18888] ? __fget_files+0x261/0x470 [ 1087.850238][T18888] ksys_read+0x122/0x250 [ 1087.854542][T18888] ? vfs_write+0xde0/0xde0 [ 1087.859004][T18888] ? syscall_enter_from_user_mode+0x26/0x80 [ 1087.864955][T18888] do_syscall_64+0x39/0xb0 [ 1087.869413][T18888] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1087.875362][T18888] RIP: 0033:0x7fde4623e09c [ 1087.879807][T18888] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1087.899716][T18888] RSP: 002b:00007fde46fdf160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1087.908170][T18888] RAX: ffffffffffffffda RBX: 00007fde463abf80 RCX: 00007fde4623e09c [ 1087.916173][T18888] RDX: 000000000000000f RSI: 00007fde46fdf1e0 RDI: 0000000000000004 [ 1087.924278][T18888] RBP: 00007fde46fdf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.932281][T18888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.940279][T18888] R13: 00007ffd4cd98fcf R14: 00007fde46fdf300 R15: 0000000000022000 [ 1087.948296][T18888] [ 1087.956073][T18890] CPU: 0 PID: 18890 Comm: syz-executor.0 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1087.966068][T18890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1087.976152][T18890] Call Trace: [ 1087.979465][T18890] [ 1087.982416][T18890] dump_stack_lvl+0x136/0x150 [ 1087.987141][T18890] should_fail_ex+0x4a3/0x5b0 [ 1087.991864][T18890] _copy_to_user+0x30/0xc0 [ 1087.996337][T18890] simple_read_from_buffer+0xd0/0x160 [ 1088.001759][T18890] proc_fail_nth_read+0x191/0x220 [ 1088.006832][T18890] ? proc_fault_inject_read+0x230/0x230 [ 1088.012429][T18890] ? xfs_bmap_insert_extents+0x171/0x830 [ 1088.018187][T18890] ? trace_contention_end+0xd8/0x100 [ 1088.023525][T18890] vfs_read+0x1db/0x910 [ 1088.027716][T18890] ? proc_fault_inject_read+0x230/0x230 [ 1088.033310][T18890] ? kernel_read+0x1b0/0x1b0 [ 1088.037963][T18890] ? receive_fd+0x110/0x110 [ 1088.042674][T18890] ? __fget_files+0x261/0x470 [ 1088.047398][T18890] ksys_read+0x122/0x250 [ 1088.051672][T18890] ? vfs_write+0xde0/0xde0 [ 1088.056122][T18890] ? syscall_enter_from_user_mode+0x26/0x80 [ 1088.062095][T18890] do_syscall_64+0x39/0xb0 [ 1088.066565][T18890] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1088.072499][T18890] RIP: 0033:0x7fcc68a3e09c [ 1088.076948][T18890] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1088.096591][T18890] RSP: 002b:00007fcc6988b160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 07:32:51 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) [ 1088.105038][T18890] RAX: ffffffffffffffda RBX: 00007fcc68babf80 RCX: 00007fcc68a3e09c [ 1088.113042][T18890] RDX: 000000000000000f RSI: 00007fcc6988b1e0 RDI: 0000000000000004 [ 1088.121044][T18890] RBP: 00007fcc6988b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.129040][T18890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.137038][T18890] R13: 00007fff8e258cdf R14: 00007fcc6988b300 R15: 0000000000022000 [ 1088.145051][T18890] 07:32:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x8, 0x0, 0x0) 07:32:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:52 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000300)=@raw=[@map_fd], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 07:32:52 executing program 4: bpf$MAP_CREATE(0x2, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000), 0x48) 07:32:52 executing program 3: write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x3, {0xddfc, 0x8000000, "41739932ebbec5ff4bb8d8b43c221438a7fbf342ba4203312206f2c7c3d829ad76186dc2d308dd8f6f3d7a83aa3f39fc02c90629ba89d822fc479b0c7b296fedebc00a2c8912bc7bb0664ae1698f17b1db1116c12df221c39c1cd1fe9c67e2f7862113d2550ee4fc87e0d4b5d96a434bb92cfdaecfe1663b219ae2f8df62d2227f5404b92034ecd92edfcc2d2a550e4001af7e7bee40b048c738011a7ffab9a26fec776518d2ad4af9c676e0ca554bb7b232ab9b9818774a008b7a545c78645f45bd5e30dfcd78d5a6ed746a482ed7b2a093adc4d61603e6220443abccdc67a4045766b950c9929e612df82385fd69b6f7327e0cc39b057097edf637ac6b1596", 0x1f, 0x40, 0x0, 0x80, 0x0, 0x7, 0x2, 0x1}}}, 0x128) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffbff}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0xf658e92c44373212) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x3) 07:32:52 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000000000), 0x48) 07:32:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x6, 0x0, 0x0) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x10, 0x0, 0x0) 07:32:52 executing program 3: write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x3, {0xddfc, 0x8000000, "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", 0x1f, 0x40, 0x0, 0x80, 0x0, 0x7, 0x2, 0x1}}}, 0x128) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffbff}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0xf658e92c44373212) (async) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x300) 07:32:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x6, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000), 0x48) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x11, 0x0, 0x0) 07:32:52 executing program 4: bpf$MAP_CREATE(0x5, 0x0, 0x0) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x3000000) 07:32:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x6, 0x0, 0x0) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 07:32:52 executing program 3: write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x3, {0xddfc, 0x8000000, "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", 0x1f, 0x40, 0x0, 0x80, 0x0, 0x7, 0x2, 0x1}}}, 0x128) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffbff}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0xf658e92c44373212) (async) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c) 07:32:52 executing program 4: bpf$MAP_CREATE(0x6, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x6, &(0x7f0000000000), 0x48) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x300000000000000) 07:32:52 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:52 executing program 4: bpf$MAP_CREATE(0x7, 0x0, 0x0) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x13, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x7, &(0x7f0000000000), 0x48) 07:32:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) socketpair(0xb, 0x85d374aa08257ef0, 0x7, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x89, &(0x7f0000000240)=""/137, 0x41000, 0x5fb3b17b855a8051, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x9, 0x79}, 0x10, 0x1df17, r3, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x44840) 07:32:52 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) 07:32:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) socketpair(0xb, 0x85d374aa08257ef0, 0x7, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x89, &(0x7f0000000240)=""/137, 0x41000, 0x5fb3b17b855a8051, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x9, 0x79}, 0x10, 0x1df17, r3, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x89, &(0x7f0000000240)=""/137, 0x41000, 0x5fb3b17b855a8051, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x9, 0x79}, 0x10, 0x1df17, r3, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x44840) 07:32:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x14, 0x0, 0x0) 07:32:52 executing program 4: bpf$MAP_CREATE(0x8, 0x0, 0x0) 07:32:52 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f0000000000), 0x48) 07:32:52 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async, rerun: 32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x15, 0x0, 0x0) 07:32:53 executing program 4: bpf$MAP_CREATE(0x9, 0x0, 0x0) 07:32:53 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000000000), 0x48) 07:32:53 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) socketpair(0xb, 0x85d374aa08257ef0, 0x7, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x89, &(0x7f0000000240)=""/137, 0x41000, 0x5fb3b17b855a8051, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x9, 0x79}, 0x10, 0x1df17, r3, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x44840) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) socketpair(0xb, 0x85d374aa08257ef0, 0x7, &(0x7f0000000180)) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x89, &(0x7f0000000240)=""/137, 0x41000, 0x5fb3b17b855a8051, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x9, 0x79}, 0x10, 0x1df17, r3, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x44840) (async) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x16, 0x0, 0x0) 07:32:53 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000000), 0x48) 07:32:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async, rerun: 32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) 07:32:53 executing program 4: bpf$MAP_CREATE(0xa, 0x0, 0x0) 07:32:53 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x17, 0x0, 0x0) 07:32:53 executing program 2: bpf$MAP_CREATE(0xb, &(0x7f0000000000), 0x48) 07:32:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 07:32:53 executing program 4: bpf$MAP_CREATE(0xb, 0x0, 0x0) 07:32:53 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) 07:32:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:53 executing program 2: bpf$MAP_CREATE(0xc, &(0x7f0000000000), 0x48) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x18, 0x0, 0x0) 07:32:53 executing program 4: bpf$MAP_CREATE(0xc, 0x0, 0x0) 07:32:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 07:32:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 07:32:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) (async) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:53 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000000), 0x48) 07:32:53 executing program 4: bpf$MAP_CREATE(0xd, 0x0, 0x0) 07:32:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x19, 0x0, 0x0) 07:32:53 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) socket$can_j1939(0x1d, 0x2, 0x7) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) (async) 07:32:53 executing program 2: bpf$MAP_CREATE(0xe, &(0x7f0000000000), 0x48) 07:32:53 executing program 4: bpf$MAP_CREATE(0xe, 0x0, 0x0) 07:32:53 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1a, 0x0, 0x0) 07:32:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:53 executing program 2: bpf$MAP_CREATE(0xf, &(0x7f0000000000), 0x48) 07:32:54 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xfffffffffffffe70) 07:32:54 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:54 executing program 4: bpf$MAP_CREATE(0xf, 0x0, 0x0) 07:32:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) 07:32:54 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000000), 0x48) 07:32:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1b, 0x0, 0x0) 07:32:54 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:54 executing program 2: bpf$MAP_CREATE(0x11, &(0x7f0000000000), 0x48) 07:32:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:54 executing program 4: bpf$MAP_CREATE(0x10, 0x0, 0x0) 07:32:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1c, 0x0, 0x0) 07:32:54 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:54 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) socket$inet6(0xa, 0x80000, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xfffffffffffffe70) 07:32:54 executing program 2: bpf$MAP_CREATE(0x12, &(0x7f0000000000), 0x48) 07:32:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:54 executing program 4: bpf$MAP_CREATE(0x11, 0x0, 0x0) 07:32:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1d, 0x0, 0x0) 07:32:54 executing program 2: bpf$MAP_CREATE(0x13, &(0x7f0000000000), 0x48) 07:32:54 executing program 4: bpf$MAP_CREATE(0x12, 0x0, 0x0) 07:32:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1e, 0x0, 0x0) 07:32:54 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:54 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) 07:32:54 executing program 2: bpf$MAP_CREATE(0x14, &(0x7f0000000000), 0x48) 07:32:54 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:54 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xfffffffffffffe70) 07:32:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x21, 0x0, 0x0) 07:32:54 executing program 4: bpf$MAP_CREATE(0x13, 0x0, 0x0) 07:32:54 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:54 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000), 0x48) 07:32:54 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:55 executing program 4: bpf$MAP_CREATE(0x14, 0x0, 0x0) 07:32:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 07:32:55 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:55 executing program 2: bpf$MAP_CREATE(0x16, &(0x7f0000000000), 0x48) 07:32:55 executing program 4: bpf$MAP_CREATE(0x15, 0x0, 0x0) 07:32:55 executing program 2: bpf$MAP_CREATE(0x17, &(0x7f0000000000), 0x48) 07:32:55 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 07:32:55 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f0000000000), 0x48) 07:32:55 executing program 4: bpf$MAP_CREATE(0x16, 0x0, 0x0) 07:32:55 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0xa, 0xfffffffd) socket$inet6(0xa, 0x4, 0x3f) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80000, 0xdf29) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x88, 0x22, 0x0, 0xfffffffffffffdd3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x7, {"27d75499c779c3acf9c6175e2e653188"}, 0x2, 0x8, 0xff}, @in6={0xa, 0x4e21, 0x5, @empty, 0x2850}}}, 0x118) 07:32:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6(0xa, 0x5, 0x8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:55 executing program 4: bpf$MAP_CREATE(0x17, 0x0, 0x0) 07:32:55 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:55 executing program 2: bpf$MAP_CREATE(0x19, &(0x7f0000000000), 0x48) 07:32:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2a, 0x0, 0x0) 07:32:55 executing program 2: bpf$MAP_CREATE(0x1a, &(0x7f0000000000), 0x48) 07:32:55 executing program 4: bpf$MAP_CREATE(0x18, 0x0, 0x0) 07:32:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2b, 0x0, 0x0) 07:32:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:32:55 executing program 2: bpf$MAP_CREATE(0x1b, &(0x7f0000000000), 0x48) 07:32:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2c, 0x0, 0x0) 07:32:55 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6(0xa, 0xa, 0xfffffffd) socket$inet6(0xa, 0x4, 0x3f) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) (async) r1 = socket$inet6(0xa, 0x80000, 0xdf29) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x88, 0x22, 0x0, 0xfffffffffffffdd3) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x7, {"27d75499c779c3acf9c6175e2e653188"}, 0x2, 0x8, 0xff}, @in6={0xa, 0x4e21, 0x5, @empty, 0x2850}}}, 0x118) 07:32:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:32:55 executing program 4: bpf$MAP_CREATE(0x19, 0x0, 0x0) 07:32:55 executing program 2: bpf$MAP_CREATE(0x1c, &(0x7f0000000000), 0x48) 07:32:55 executing program 4: bpf$MAP_CREATE(0x1a, 0x0, 0x0) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2d, 0x0, 0x0) 07:32:56 executing program 2: bpf$MAP_CREATE(0x1d, &(0x7f0000000000), 0x48) 07:32:56 executing program 4: bpf$MAP_CREATE(0x1b, 0x0, 0x0) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2e, 0x0, 0x0) 07:32:56 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6(0xa, 0xa, 0xfffffffd) (async, rerun: 64) socket$inet6(0xa, 0x4, 0x3f) (async, rerun: 64) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) socket$inet6(0xa, 0x2, 0x0) (async, rerun: 32) r1 = socket$inet6(0xa, 0x80000, 0xdf29) (rerun: 32) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x88, 0x22, 0x0, 0xfffffffffffffdd3) (async, rerun: 32) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x7, {"27d75499c779c3acf9c6175e2e653188"}, 0x2, 0x8, 0xff}, @in6={0xa, 0x4e21, 0x5, @empty, 0x2850}}}, 0x118) 07:32:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x98a4) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffdef) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x4, 0x100, 0x8, {0x0, 0x2710}, {r2, r3/1000+60000}, {0x0, 0x1, 0x0, 0x1}, 0x1, @can={{0x1, 0x1, 0x1, 0x1}, 0x3, 0x1, 0x0, 0x0, "6f825b61e4a7ddea"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 07:32:56 executing program 2: bpf$MAP_CREATE(0x1e, &(0x7f0000000000), 0x48) 07:32:56 executing program 4: bpf$MAP_CREATE(0x1c, 0x0, 0x0) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 07:32:56 executing program 2: bpf$MAP_CREATE(0x21, &(0x7f0000000000), 0x48) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2f, 0x0, 0x0) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 07:32:56 executing program 4: bpf$MAP_CREATE(0x1d, 0x0, 0x0) 07:32:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x98a4) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffdef) (async) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x4, 0x100, 0x8, {0x0, 0x2710}, {r2, r3/1000+60000}, {0x0, 0x1, 0x0, 0x1}, 0x1, @can={{0x1, 0x1, 0x1, 0x1}, 0x3, 0x1, 0x0, 0x0, "6f825b61e4a7ddea"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 07:32:56 executing program 2: bpf$MAP_CREATE(0x22, &(0x7f0000000000), 0x48) 07:32:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x1e, 0x0, 0x3, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 07:32:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 64) r1 = socket$inet6(0xa, 0x2, 0x98a4) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffdef) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x4, 0x100, 0x8, {0x0, 0x2710}, {r2, r3/1000+60000}, {0x0, 0x1, 0x0, 0x1}, 0x1, @can={{0x1, 0x1, 0x1, 0x1}, 0x3, 0x1, 0x0, 0x0, "6f825b61e4a7ddea"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x40, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:56 executing program 4: bpf$MAP_CREATE(0x1e, 0x0, 0x0) 07:32:56 executing program 2: bpf$MAP_CREATE(0x23, &(0x7f0000000000), 0x48) 07:32:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x1e, 0x0, 0x3, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:32:56 executing program 4: bpf$MAP_CREATE(0x21, 0x0, 0x0) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x31, 0x0, 0x0) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0xee, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:56 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x90) 07:32:56 executing program 4: bpf$MAP_CREATE(0x22, 0x0, 0x0) 07:32:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x32, 0x0, 0x0) 07:32:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@delnexthop={0x60, 0x69, 0x400, 0x70bd26, 0x25dfdbfc, {}, [{0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}, {0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4000801) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in=@loopback, 0x4e24, 0x0, 0x4e24, 0x3, 0x2, 0x100, 0x0, 0x2f, 0x0, 0xee00}, {0x8, 0xffffffffffffff5f, 0x18df, 0x8, 0x3, 0xf829, 0x100, 0x4}, {0x3, 0x7, 0xffffffff, 0x3}, 0x3, 0x6e6bb9, 0x2, 0x1, 0x0, 0x2}, {{@in=@empty, 0x4d6, 0x32}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x3502, 0x3, 0x0, 0x3, 0x8, 0x8001, 0xc7}}, 0xe8) 07:32:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x10000, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x1e, 0x0, 0x3, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x1e, 0x0, 0x3, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) 07:32:57 executing program 2: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x80c00, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, r0, 0x2}, 0x48) 07:32:57 executing program 4: bpf$MAP_CREATE(0x23, 0x0, 0x0) 07:32:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 07:32:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)="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", 0x1000, 0x0, 0x0, 0x0) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)=0x0) r3 = getegid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000010c0)={{0x2, r2, r3, 0x0, 0xee01, 0xcd, 0x9}, 0x0, 0x0, 0xb8, 0xfff, 0x9, 0x40, 0x8000000000000001, 0x3, 0x200, 0x3}) 07:32:57 executing program 2: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x80c00, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, r0, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, r0, 0x2}, 0x48) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@delnexthop={0x60, 0x69, 0x400, 0x70bd26, 0x25dfdbfc, {}, [{0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}, {0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4000801) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in=@loopback, 0x4e24, 0x0, 0x4e24, 0x3, 0x2, 0x100, 0x0, 0x2f, 0x0, 0xee00}, {0x8, 0xffffffffffffff5f, 0x18df, 0x8, 0x3, 0xf829, 0x100, 0x4}, {0x3, 0x7, 0xffffffff, 0x3}, 0x3, 0x6e6bb9, 0x2, 0x1, 0x0, 0x2}, {{@in=@empty, 0x4d6, 0x32}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x3502, 0x3, 0x0, 0x3, 0x8, 0x8001, 0xc7}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00'}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@delnexthop={0x60, 0x69, 0x400, 0x70bd26, 0x25dfdbfc, {}, [{0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}, {0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4000801) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in=@loopback, 0x4e24, 0x0, 0x4e24, 0x3, 0x2, 0x100, 0x0, 0x2f, 0x0, 0xee00}, {0x8, 0xffffffffffffff5f, 0x18df, 0x8, 0x3, 0xf829, 0x100, 0x4}, {0x3, 0x7, 0xffffffff, 0x3}, 0x3, 0x6e6bb9, 0x2, 0x1, 0x0, 0x2}, {{@in=@empty, 0x4d6, 0x32}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x3502, 0x3, 0x0, 0x3, 0x8, 0x8001, 0xc7}}, 0xe8) (async) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x10) 07:32:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x35, 0x0, 0x0) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x710, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)="7d1db7bc3514cbaf200ce04b2e07a5539e438690427841e58a28e290786ecb3380d77fead3635b0adf4067645a5d10135c5912c80e0c0093a42be41d21845418dff6744c6f8232c1d5c4748d0085773a1727118eb4f81f03fb6134094cb13bb742276eee9b4d6baee003032a0bfdc73c11d7d1f1e54e470473f518839302014688b123acc8d229a36d5237bd44586c11a671194c09dfeb470e4e27524bc91a6e33dee229fd01f45fc5961ac87b87bcb3f2b1002f54bd6b6f6e7cb44617635ba9b44b1d20419ee90b9ffc7719995893e125a4fbf89a5f55c01918ef81c634ecc642b4632402f37a50a299aefd6e9996c80bdd7b56ddb14bcc532e5afa93ddfecb747c446919d08ff994062e252647d1c7956698ce735fd0353b74f3d98e5e9d76f011a4a7c7f2c00cdd5e41f1ba4eb3dc2c86074afb90746dffcea5c2d9b0f1d08882a629fea72cd08dcc065991f512a53de351930a52cea57a432b0b70cd91d71eec28ae460cfe48b3f6031a08545cdf453d59ff7cd90fdc735e3737466e5599f9c13a37c0aa552b41866df8a17342bc393d33e9f1dd4baeb3cd5a567906d38a28ff41f9d6bb659ab6e75836d64e08150878b325593d70099b8923a21a094bd755fdc79ca4452a5372e94e44dd8f4284486d66ec54e6891703b04dec1e707e22b6c604800ea955e4b58a225d2982f22d158ef6e7717d62beefec9de98d557c933a95c593efb196e11fff0b3ca7cae3559c652a33dac8ccc626e4e28e14220478085131c1c6a0a3a8d89b5c01c68de751e4fd1e2c9e533dd05098de54c6fb8226535515ea57bad544a3a3b7128b3e52f5f2b95290cf8166b3de2723f8d634eb8fc3f5a087a7d601efb25a8f59121621301ba57d6b2687f1887196867c89d488ddb6c5272d63d7e3ee1cdac292955682b2f30c894844c03dfa5726a38e7df68b21b2ad89a26c249f2073285a5adcf040ebb1398ef6f2f6bf61fbeaf0a4e711054b3c76674f73c4eb510c9fb42ea0e1465cae26eeacebec4a9e488a6de146ded5ca366c1a2fbf7e8af76a3b6e91448b812594cf130e5ff9f06432dddc6d2644f0250cf8b8f4e865dd275509b518704a086e443ac419515b20055ed34622a0037398a1b9866cd2c3d36bc29dfd7be7a8042a1d0449cb201b60bdc0c71c2235b3532a054722212019a4df6aff964ded5cc48e03cfacf29ca3872873fd9e4aef8a0ac67137226c615f7bfbba0c4c4940a7fc81f65bc314e6770b3d64a5331eb8b08c1141bf4c455ee794cfe7b28740ca3cb1b464bd0f23bdd745e3bcc29c9c4286260b349a3588f07190cbc75d7f35848f9bc905044093f53bc91a649e33cb286ec85fd8dae8d402f03f7257ff04f9f944f14b889676e32882a15eaf44d6fa9df67b401de85eae5741188b24b5830f55899b0f0769560c0d0a2d3dc4c592e7981815aa25d5c9eac9c594a64b8a13b3bc2f59f99ebf1d1131596f78b178acd021bc215d6c0cd7695f7baf92efac1823b2e287bc0608a5db525bdbd71c108a1cec66cabaf02285577476001647e32446a528e069b8fc2f939e82d794cc07e823a36af0ff24c8639ca43385a6277e3a4514d3dfa62c9c6bfc342e26a1df9c9b616c452004d2271d8ab58a1fe3d8c0a7faaba002710e60eceb989bb7e568c5074e3c4d62050a79a867dd921ce88773d428da957c19c4862b050957256ff2ea56566a701f5ebea58be869f72a7c75f3f846e1499ee40455460e5cf479b009de7c8dcd8122a810b0c3d9bb0c71bd3872d66b5120a86f4ca731a26f953b6fb2c8440005e0ab4ebd900cc230ac2aa0661e206ed8d903c7e3b3ccbce0882690903c2ffbc5c17b9670050e90d61caa7c1865a74db16818cf845ab9c256a91af71d5c8e5e0287adbe2820376459dd5245138ba1cfa76d8b5e8a0430e45165db32f424514b8a964eec6170f017f97baa2c9e8220596eacd9353ae8e1b4f8c538e37a6ea1da49886b8160b2083dbf089ae83fdc18820a706f3d091cf33ea51547e0abf4e3ddadffca07b831810c043c7b21e4fe13f5aa01dc66d4b66c440a65bb8fe625bec3b2e45bed50e7f38c648552df7c3f3497fe66f115ba82ba726075348e22a912b0f66e5be0a3519aa4f5f0c46062911f47ca7e3586651fd380b101ef2d7fd50e18f2772bdc09822f2214006002cd31fdc990a0aab052fd2401fdfac78e3e99ea48dda138dca1cb87cfac1ffb7e8f95352940b70c042de6e93613777a59c0ef6045432da836b8e20910036e353eada06be3e89d97b4277e2d446f871b170ba5733ae7bc17b13453eef9aae50c27bd07d70d7ae48fedac7f81217169f45ba54a5242168f0a454111524130a7582790929153bdd1447189068e5b999be0b6f9c9f904e8d42a605f8e7368b4a62c8fc3d03b88068e698204e8c4208fdcd04729cd22b65f9b00002f375210778f0be30d206bd296928b888abce428ba8a26317c17a1a0dc1e6bc43cd70c6ffd80590c4fc9a3be51f8df6a418f3c333fadd52c266adf5b942d8340ff0e87b113cee976a154fde9ad6e90f06334883979397053ec24886739afff6956dde68ef928763c8237e0cc927b853d31e8dae3c426cf055c0c2303aa625f1cb4f0c0a5428435b3cc975bb165ec9df4ddea8478a53edee707f1a171c493eb544534415df1992781362b144b13eb83fb64010fce81d1769d63ed039dcef57bfff3ba0f583d1be50dc04c9803aa2e5f8e9ffad3a8ea4a9e75841ef193da6a8f6d92c16ae738ece0f3419b99a0727333b4658f73c5cd90d820b3141bc61e547acaf2f400be9c39086ec94927906239d03be811ec4bd6b0738551affab45a0213eb3b92f9a4305573650e9599ab104c5c74e03015b2854560050132a750bd1b00989bc39c4170bbcfb92b395f8a5d709358f66c539116ce5dcf9c5f18afce095ce1d856c1ecbecb18ec9221bb86ce2bc5b9eb105046042db698e595e8d73aee5c298ecc8cd0d3898632967b53ed82e0e8c53c887172a632b2b588daaf4d2891c8a7770d0c99790540ab1905ba31116e443e516a363f58b827661a2073f1ed4bc725c7ecd1bcee7c4f053299164354daf9a8e6dcf122cfb775a6fc2191dc3152651770a80bd71620894c16f002d931721fb7ecc005da6f5303eb98b4d5805d8a25680854891eabd9b795288b2296aaae41274a741571279194aeb91c8c3d206c7e124c3b521cf22ed80318e202b8859f749df1c9ee933f100b6c2f079982803bacbc035498ca58b1d424d53cbbaddf269e048060e32b1d4102f8874ef0bf265e70c290497dcb2122b16bef0732af425991e69dbc7f7c77e4fd950433c197a439ef0290f87f4dc65d3a0662885339cf1a589db9cb00cc7da9b5ad9c76d7e81b0520e8d3c33a854090a9540986c45dbcb9822cdcff4686d2e9592dcfa16df4e111d89a1c38f92f67cff5aa9dfbec066d7289f80da1cf96e2bd81ac12569cc1a6b3f7ae99a78233a7056b413d57d2f6c8ce474202f521b015f508903db761c76c1dc665eb2d1ef77396d43917ac00e86be085896a18220aef21761a832b29f08c25ae35e159cd528c0c9e55fa521f366c7ffb1e0d20e33d6691a35c220a76dd22150c075e5cb1267f20044d07c8a80cf6b4f0114c7619655b31d28839f003da0259f191f8801e806426afcc42afdf52f8f79959d47c94537b94a8021aeabb8cb15645cd799761afd1ea4a0c2a9edfd2e301add032a6ab059226633b3809d91154d0b2f360550c70874c63e1e6fc013459af5e1754265551549e5f45b421369367199b5a839dec0451ebd6ec4e8b273b1fa6cac3ab6c7efd5c1e67da3f85d227f4c99b17c59a71a31f69ef182766441ea28e7834370b19286659baf31ceda5fa889175bf500f8e9ab656a02196f8e97336b05c18d0216d76af9bfcef598a9eed3433064d753cd411873e27a9b4996f7dcb85ce9512d27c9d0a01b39b768c2f5188d1976bc718f7fa5df0ddba4c25e3a84f42cdf9c76436207a820c9c02dd4905961b1df865d594c53f12c7fa145b87ad8844813b060ef14511f9d469e8ceecffbf770ae694269887815397c0e51da2412b25f33796672aa0c0dd577a13c4205f0e90bdb124ca7103b6674b3878f4b7b838f2d53354448029b18a45ea2fd7bb2893ca72ee61d1f17673060a4f4ce6d078edf8ff3917021a63e94f80da201022cc740fa85bbc2bba445b9624ca6392bea2414c6755e2c566ef4cd4168c8fff4e5f24c3774cf772905ab80fadc37ae04b62b40abe51be969560830f8370c303edca840e4b7850c950d445a5459aea46910b60bd2c14ee45d2b7ce09eb39ff505a1531c334673c940623a27542f1f24883f71fd0149961e8c80cef66801b71adec50c615a7b827e55baab64fbc234903c5b5e61ca4871088e084e6b62d4a253d4c13d337796295d3617e52b04ecebc0805587fba9617067863ff1824b0baca5cfac557382c5294478daac0c42b5f43bcd01613fea209283e30cc3488f084297bceb9122a84ceb372c4e54f615788990f29b41f2c24466af5256d0a1b09253a077382ce32c678d079b2eb4e345bab78ffe206cd22dfda0267304c6bbed25cd43da31372f440c8aaee35ed3bb0b6fd889134a80e82dacb724cc3e5f9185461e5b073b27b506541efab9be74c59fbd1fbeb3e0c714ed2f7e4cec6adf2ad808420bc6d86d5fcd5f1ae60e9f120be22139f446ffda4aaf76c7256bc6d7d5c695fde98430b89958f64a9f0827f62908817145b202200222d78da945b0b45b33e15aee7f1fae8ec691ac3e59967c30d60e1e395bb1799a1cc8b3512706b7f054bc55aeb5a8d2a16265d2ffd72c1eff6defcdfae0449082431f3b7ca68082ccd612e3c8cc1673130f608debd046fdffb8204e0b02957fd93668adca5b8d6de23ca4057860ee92c2912b86c027da6c1a2dcee42dd499fa7c26a5cdffb1973c9a5ae6f6f995ef0978ad304a5736be7b4b6f74b518bf6dc064827940c2b18e777819ae6d444bac77381703b9d64c337eb0367a048b52960ab7a897d43090e8436cc341be11eb8b31b19aa8e229e1222441677e316df5fafd33d51b7b7155035c6374ab212eea394c01bf6efde03b1747c2a1fe33f2afaf81547e74efa3e50068ee6004b1a0126a5304c9a7e412b68a1b18a4e295c3ff351b81401585f969c6871ae4760323eaaeddacd08091f3c3512e1c2f63d0edde3795d3eb08745f80a6227701150aacbfecb5fb0dc58d913751f57e9f0ab310241a783d5b80791be41ea260c45a8422cc3fc8e76f6fb5d3d230a862df287485cdf8ea3c2411931d00296cb715ca74b3ca2a0d7d414fea46da5da37f404f22b40af72ee3994fb43d5409f6fa43b20c71f4508068a16db07d1106748cf0934f5fef8d9f497c7db31c2d1ce53f429a2a8bb37f79371f35af6f5f55cb89277ad1ac42586d5faf4acf553eb7ee116734b21baf2d2a31305fca6ed028ce67c34d2444697b2179be7693ba2e8aa8cd08c0594b3dc75487b89d6f995269c608ab7fc37590d98f302437f4c08d95b4e310e6ee6c9c6c94e8d06b0b84887bd2694c1e7a4a13b4e98d23a7b5fdba9b36e4b21d5d651e96d0feda35977c8776df2af8725accbeefeed8d28b7ed341fbad395ff9f9323fc2994ecef7cec2b2604f887ee293efe445c9e5b012c0dcda9a310d1f24c72a3e909a4ca207017a391f18caa6e3c565086aac409c8ccc90d75d2a79922417eeda7e0a3e54172b947451f9bf2a91cd1f077429c6c14f381bfa7ef8b130f61ba04e82503075034", 0x1000, 0x0, 0x0, 0x0) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)=0x0) r3 = getegid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000010c0)={{0x2, r2, r3, 0x0, 0xee01, 0xcd, 0x9}, 0x0, 0x0, 0xb8, 0xfff, 0x9, 0x40, 0x8000000000000001, 0x3, 0x200, 0x3}) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendto$inet6(r1, &(0x7f0000000000)="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", 0x1000, 0x0, 0x0, 0x0) (async) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) (async) getegid() (async) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000010c0)={{0x2, r2, r3, 0x0, 0xee01, 0xcd, 0x9}, 0x0, 0x0, 0xb8, 0xfff, 0x9, 0x40, 0x8000000000000001, 0x3, 0x200, 0x3}) (async) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x90) 07:32:57 executing program 2: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x80c00, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, r0, 0x2}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x80c00}) (async) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, r0, 0x2}, 0x48) (async) 07:32:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00'}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@delnexthop={0x60, 0x69, 0x400, 0x70bd26, 0x25dfdbfc, {}, [{0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}, {0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4000801) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in=@loopback, 0x4e24, 0x0, 0x4e24, 0x3, 0x2, 0x100, 0x0, 0x2f, 0x0, 0xee00}, {0x8, 0xffffffffffffff5f, 0x18df, 0x8, 0x3, 0xf829, 0x100, 0x4}, {0x3, 0x7, 0xffffffff, 0x3}, 0x3, 0x6e6bb9, 0x2, 0x1, 0x0, 0x2}, {{@in=@empty, 0x4d6, 0x32}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x3502, 0x3, 0x0, 0x3, 0x8, 0x8001, 0xc7}}, 0xe8) 07:32:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x36, 0x0, 0x0) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)="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", 0x1000, 0x0, 0x0, 0x0) (async, rerun: 32) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)=0x0) (async, rerun: 32) r3 = getegid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000010c0)={{0x2, r2, r3, 0x0, 0xee01, 0xcd, 0x9}, 0x0, 0x0, 0xb8, 0xfff, 0x9, 0x40, 0x8000000000000001, 0x3, 0x200, 0x3}) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x9000) 07:32:57 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) 07:32:57 executing program 3: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x834, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1b1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc3a9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4048804}, 0x44) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x37, 0x0, 0x0) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x0, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x100000) 07:32:57 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) 07:32:57 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) 07:32:57 executing program 3: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x834, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1b1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc3a9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4048804}, 0x44) socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x90000000) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x0, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) 07:32:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x38, 0x0, 0x0) 07:32:57 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) 07:32:57 executing program 3: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x834, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1b1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc3a9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4048804}, 0x44) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x0, 0x7, 0x10000, 0x3}}) 07:32:57 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x1000000000000) 07:32:57 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xff, 0x69, 0x2, 0x100, r0, 0xc44, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0xa}, 0x48) 07:32:58 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) 07:32:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x0, 0x10000, 0x3}}) 07:32:58 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xff, 0x69, 0x2, 0x100, r0, 0xc44, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0xa}, 0x48) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xff, 0x69, 0x2, 0x100, r0, 0xc44, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0xa}, 0x48) (async) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x10000000000000) 07:32:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = socket$inet6(0xa, 0xa, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@remote, 0x4e22, 0x7, 0x4e21, 0x8fd, 0xa, 0x0, 0x20, 0x2b, r2, 0xffffffffffffffff}, {0x769, 0x5, 0x400, 0x7, 0x1, 0xfff, 0x2, 0x6}, {0x9, 0x9, 0x55, 0xf0da}, 0x5c, 0x6e6bb2, 0x2, 0x1, 0x0, 0x3}, {{@in6=@mcast2, 0x4d6, 0x33}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, 0x3506, 0x0, 0x1, 0x9, 0x0, 0x2c, 0x4}}, 0xe8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4}, 0x8) 07:32:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3a, 0x0, 0x0) 07:32:58 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x9000000000000000) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x0, 0x10000, 0x3}}) 07:32:58 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xff, 0x69, 0x2, 0x100, r0, 0xc44, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0xa}, 0x48) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x28, 0x404080) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff4000/0xc000)=nil, 0xc000}, 0x4}) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x0, 0x10000, 0x3}}) 07:32:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3b, 0x0, 0x0) 07:32:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) (async, rerun: 32) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) (async, rerun: 32) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (rerun: 32) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:58 executing program 2: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="3b0f25bd7000fcdbdf250e0000000000000003ffaaaaaaaa00000847003c000600000008003b00008000"/59], 0x40}, 0x1, 0x0, 0x0, 0x1000}, 0x4000804) r0 = syz_open_dev$audion(&(0x7f0000000180), 0x8, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, '\x00', 0x0, r0}, 0x48) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x28, 0x404080) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff4000/0xc000)=nil, 0xc000}, 0x4}) 07:32:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0xa, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@remote, 0x4e22, 0x7, 0x4e21, 0x8fd, 0xa, 0x0, 0x20, 0x2b, r2, 0xffffffffffffffff}, {0x769, 0x5, 0x400, 0x7, 0x1, 0xfff, 0x2, 0x6}, {0x9, 0x9, 0x55, 0xf0da}, 0x5c, 0x6e6bb2, 0x2, 0x1, 0x0, 0x3}, {{@in6=@mcast2, 0x4d6, 0x33}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, 0x3506, 0x0, 0x1, 0x9, 0x0, 0x2c, 0x4}}, 0xe8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4}, 0x8) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x7, 0x0, 0x3}}) 07:32:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3c, 0x0, 0x0) 07:32:58 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:58 executing program 2: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="3b0f25bd7000fcdbdf250e0000000000000003ffaaaaaaaa00000847003c000600000008003b00008000"/59], 0x40}, 0x1, 0x0, 0x0, 0x1000}, 0x4000804) r0 = syz_open_dev$audion(&(0x7f0000000180), 0x8, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x80800}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, '\x00', 0x0, r0}, 0x48) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x28, 0x404080) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff4000/0xc000)=nil, 0xc000}, 0x4}) (async) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff4000/0xc000)=nil, 0xc000}, 0x4}) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @dev, 0x710, 0x7}}) 07:32:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3e, 0x0, 0x0) 07:32:58 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:58 executing program 2: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="3b0f25bd7000fcdbdf250e0000000000000003ffaaaaaaaa00000847003c000600000008003b00008000"/59], 0x40}, 0x1, 0x0, 0x0, 0x1000}, 0x4000804) (async) r0 = syz_open_dev$audion(&(0x7f0000000180), 0x8, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, '\x00', 0x0, r0}, 0x48) 07:32:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:58 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x93158dec3394f892) socketpair(0x29, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040801}, 0x800) 07:32:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0xa, 0x4) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) (rerun: 64) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@remote, 0x4e22, 0x7, 0x4e21, 0x8fd, 0xa, 0x0, 0x20, 0x2b, r2, 0xffffffffffffffff}, {0x769, 0x5, 0x400, 0x7, 0x1, 0xfff, 0x2, 0x6}, {0x9, 0x9, 0x55, 0xf0da}, 0x5c, 0x6e6bb2, 0x2, 0x1, 0x0, 0x3}, {{@in6=@mcast2, 0x4d6, 0x33}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, 0x3506, 0x0, 0x1, 0x9, 0x0, 0x2c, 0x4}}, 0xe8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4}, 0x8) 07:32:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x42, 0x0, 0x0) 07:32:59 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:32:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4, 0xfa00, {r1}}, 0xc) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x10004054}, 0x20000000) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xf7ddac60d7947ad}, 0x4000041) 07:32:59 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x93158dec3394f892) (async) socketpair(0x29, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040801}, 0x800) 07:32:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, 0x0) 07:32:59 executing program 3: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@empty, 0x4, 0x1, 0x2, 0x9, 0xfff8, 0x4}, &(0x7f0000000140)=0x20) 07:32:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4, 0xfa00, {r1}}, 0xc) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x10004054}, 0x20000000) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xf7ddac60d7947ad}, 0x4000041) 07:32:59 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x93158dec3394f892) socketpair(0x29, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040801}, 0x800) bpf$MAP_CREATE(0x3, 0x0, 0x93158dec3394f892) (async) socketpair(0x29, 0x3, 0x5, &(0x7f0000000000)) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040801}, 0x800) (async) 07:32:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e20, 0xfffffff9, @dev={0xfe, 0x80, '\x00', 0x28}, 0x4}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}}, {{0xa, 0x4e22, 0x80000001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa37}}]}, 0x190) 07:32:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x46, 0x0, 0x0) 07:33:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="24001f000000d866bbb24e7b071cb66d250200"/29, @ANYRES32=r1, @ANYBLOB="00008913c6645100"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x0, 0xf0}, 0x2}, 0x18) 07:33:00 executing program 3: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@empty, 0x4, 0x1, 0x2, 0x9, 0xfff8, 0x4}, &(0x7f0000000140)=0x20) 07:33:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x80000}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async, rerun: 32) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x10004054}, 0x20000000) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xf7ddac60d7947ad}, 0x4000041) 07:33:00 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x1f) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='GPL\x00', 0x2, 0xf5, &(0x7f0000000100)=""/245, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x5, 0x4}, 0x10}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 07:33:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x48, 0x0, 0x0) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x49, 0x0, 0x0) 07:33:00 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000000c0)={@none, 0xe5, 0x2, 0xffff, 0x200, 0x8af0, "43772a3db3a77e715ebef7344156b2eeedae392d530c742b8bd02d6c78cc009110c2da196b30c27cb2ac1dd7c65c2fe44b281cafa6af2ea2b580aa57171fb152365fbd962fcaa669c2fe2edd4d209920efece4d8f47257b5a7de915d217ac93fb9450e746a22436073424590ce271b0ee3d398c61c154d25b6a2f368191d919b"}) 07:33:00 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x1f) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='GPL\x00', 0x2, 0xf5, &(0x7f0000000100)=""/245, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x5, 0x4}, 0x10}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000001880)=[{&(0x7f0000000100)=""/82, 0x52}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/196, 0xc4}, {&(0x7f0000001540)=""/223, 0xdf}, {&(0x7f0000001640)=""/27, 0x1b}, {&(0x7f0000001680)=""/210, 0xd2}, {&(0x7f0000001780)=""/239, 0xef}], 0xa, &(0x7f0000001940)=""/220, 0xdc}, 0x10002) bind$can_j1939(0xffffffffffffffff, &(0x7f0000001a80)={0x1d, 0x0, 0x2, {0x1}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'wg2\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) 07:33:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="24001f000000d866bbb24e7b071cb66d250200"/29, @ANYRES32=r1, @ANYBLOB="00008913c6645100"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x0, 0xf0}, 0x2}, 0x18) 07:33:00 executing program 3: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@empty, 0x4, 0x1, 0x2, 0x9, 0xfff8, 0x4}, &(0x7f0000000140)=0x20) (async) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@empty, 0x4, 0x1, 0x2, 0x9, 0xfff8, 0x4}, &(0x7f0000000140)=0x20) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4a, 0x0, 0x0) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000001880)=[{&(0x7f0000000100)=""/82, 0x52}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/196, 0xc4}, {&(0x7f0000001540)=""/223, 0xdf}, {&(0x7f0000001640)=""/27, 0x1b}, {&(0x7f0000001680)=""/210, 0xd2}, {&(0x7f0000001780)=""/239, 0xef}], 0xa, &(0x7f0000001940)=""/220, 0xdc}, 0x10002) bind$can_j1939(0xffffffffffffffff, &(0x7f0000001a80)={0x1d, 0x0, 0x2, {0x1}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'wg2\x00'}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) 07:33:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000480}, 0x20048004) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) 07:33:00 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x1f) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='GPL\x00', 0x2, 0xf5, &(0x7f0000000100)=""/245, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x5, 0x4}, 0x10}, 0x80) (async, rerun: 64) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (rerun: 64) 07:33:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="24001f000000d866bbb24e7b071cb66d250200"/29, @ANYRES32=r1, @ANYBLOB="00008913c6645100"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x0, 0xf0}, 0x2}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="24001f000000d866bbb24e7b071cb66d250200"/29, @ANYRES32=r1, @ANYBLOB="00008913c6645100"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x0, 0xf0}, 0x2}, 0x18) (async) 07:33:00 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async, rerun: 64) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000001880)=[{&(0x7f0000000100)=""/82, 0x52}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/196, 0xc4}, {&(0x7f0000001540)=""/223, 0xdf}, {&(0x7f0000001640)=""/27, 0x1b}, {&(0x7f0000001680)=""/210, 0xd2}, {&(0x7f0000001780)=""/239, 0xef}], 0xa, &(0x7f0000001940)=""/220, 0xdc}, 0x10002) (rerun: 64) bind$can_j1939(0xffffffffffffffff, &(0x7f0000001a80)={0x1d, 0x0, 0x2, {0x1}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'wg2\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4b, 0x0, 0x0) 07:33:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000480}, 0x20048004) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) 07:33:00 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 07:33:00 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101003, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:33:00 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x10000, 0xfffffff7, 0x6, 0x10, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0xf}, 0x48) 07:33:00 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x208000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x322, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x228a00, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40014}, 0x4000000) 07:33:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000480}, 0x20048004) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000480}, 0x20048004) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) (async) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4c, 0x0, 0x0) 07:33:00 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x10000, 0xfffffff7, 0x6, 0x10, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0xf}, 0x48) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x208000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x322, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x228a00, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40014}, 0x4000000) 07:33:00 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101003, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101003, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:33:00 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4d, 0x0, 0x0) 07:33:00 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101003, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x88, 0x22, 0x0, 0x0) 07:33:00 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x10000, 0xfffffff7, 0x6, 0x10, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0xf}, 0x48) 07:33:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) 07:33:00 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x208000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x322, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x228a00, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40014}, 0x4000000) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x208000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) (async) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x322, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x88) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x228a00, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40014}, 0x4000000) (async) 07:33:01 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xe7, "cc0e1eab21fdc21b743104968d94a04638cc055b79b68dc2aa9a6b2aafb19a91094eee02fcd69d126ec78bb038a16a97c2f3c762f03ac3cb99b27a93f5bcc21b29419f3429e4f22f2beefa20526a6830d8a686454306ecb7e2a1b8358de9ab86fa0376b9e708e1507c7a8f5fdc82ac4768b496956814d2a5bb5d617e8e9c2db3d217538a71b62eda9ae21962c99547c55c76f21c690d58cf3a4caa0ab5850942c62d6c6446e906e01596304683c0efc8a2f8fb68cf32e7b8fc27521ce63a77914a3c661c4f017efa7c4e27608d1f822e2b77fba69730537dffc70822cfe824a4df86b5325dadb2"}, &(0x7f0000000200)=0x10b) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x58, "33a24080c31e2b163e60e196c8868be2fd19a5c8d3acce46fafd987fc048271e3394ffbf9de00c20c6f4af94e5ba917d03bae920ba8efbd17bbae6068fb0d9fa0413bf6e115fa46ee4768e6c8c3af4b69c6e5200f95f2773"}, &(0x7f0000000080)=0x7c) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) 07:33:01 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xa) 07:33:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4e, 0x0, 0x0) 07:33:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000040)=""/78, 0x4e}], 0x2}, 0x40010020) bind$can_j1939(r0, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x0, 0x0, 0xd80e8edd96f0f80e}, 0xfd}, 0x18) 07:33:01 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xe7, "cc0e1eab21fdc21b743104968d94a04638cc055b79b68dc2aa9a6b2aafb19a91094eee02fcd69d126ec78bb038a16a97c2f3c762f03ac3cb99b27a93f5bcc21b29419f3429e4f22f2beefa20526a6830d8a686454306ecb7e2a1b8358de9ab86fa0376b9e708e1507c7a8f5fdc82ac4768b496956814d2a5bb5d617e8e9c2db3d217538a71b62eda9ae21962c99547c55c76f21c690d58cf3a4caa0ab5850942c62d6c6446e906e01596304683c0efc8a2f8fb68cf32e7b8fc27521ce63a77914a3c661c4f017efa7c4e27608d1f822e2b77fba69730537dffc70822cfe824a4df86b5325dadb2"}, &(0x7f0000000200)=0x10b) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x58, "33a24080c31e2b163e60e196c8868be2fd19a5c8d3acce46fafd987fc048271e3394ffbf9de00c20c6f4af94e5ba917d03bae920ba8efbd17bbae6068fb0d9fa0413bf6e115fa46ee4768e6c8c3af4b69c6e5200f95f2773"}, &(0x7f0000000080)=0x7c) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xe7, "cc0e1eab21fdc21b743104968d94a04638cc055b79b68dc2aa9a6b2aafb19a91094eee02fcd69d126ec78bb038a16a97c2f3c762f03ac3cb99b27a93f5bcc21b29419f3429e4f22f2beefa20526a6830d8a686454306ecb7e2a1b8358de9ab86fa0376b9e708e1507c7a8f5fdc82ac4768b496956814d2a5bb5d617e8e9c2db3d217538a71b62eda9ae21962c99547c55c76f21c690d58cf3a4caa0ab5850942c62d6c6446e906e01596304683c0efc8a2f8fb68cf32e7b8fc27521ce63a77914a3c661c4f017efa7c4e27608d1f822e2b77fba69730537dffc70822cfe824a4df86b5325dadb2"}, &(0x7f0000000200)=0x10b) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x58, "33a24080c31e2b163e60e196c8868be2fd19a5c8d3acce46fafd987fc048271e3394ffbf9de00c20c6f4af94e5ba917d03bae920ba8efbd17bbae6068fb0d9fa0413bf6e115fa46ee4768e6c8c3af4b69c6e5200f95f2773"}, &(0x7f0000000080)=0x7c) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xa) 07:33:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x3) 07:33:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) (async, rerun: 32) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xa) bpf$MAP_CREATE(0x3, 0x0, 0xa) (async) 07:33:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x300) 07:33:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) recvmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000040)=""/78, 0x4e}], 0x2}, 0x40010020) (async) bind$can_j1939(r0, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x0, 0x0, 0xd80e8edd96f0f80e}, 0xfd}, 0x18) 07:33:01 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xe7, "cc0e1eab21fdc21b743104968d94a04638cc055b79b68dc2aa9a6b2aafb19a91094eee02fcd69d126ec78bb038a16a97c2f3c762f03ac3cb99b27a93f5bcc21b29419f3429e4f22f2beefa20526a6830d8a686454306ecb7e2a1b8358de9ab86fa0376b9e708e1507c7a8f5fdc82ac4768b496956814d2a5bb5d617e8e9c2db3d217538a71b62eda9ae21962c99547c55c76f21c690d58cf3a4caa0ab5850942c62d6c6446e906e01596304683c0efc8a2f8fb68cf32e7b8fc27521ce63a77914a3c661c4f017efa7c4e27608d1f822e2b77fba69730537dffc70822cfe824a4df86b5325dadb2"}, &(0x7f0000000200)=0x10b) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x58, "33a24080c31e2b163e60e196c8868be2fd19a5c8d3acce46fafd987fc048271e3394ffbf9de00c20c6f4af94e5ba917d03bae920ba8efbd17bbae6068fb0d9fa0413bf6e115fa46ee4768e6c8c3af4b69c6e5200f95f2773"}, &(0x7f0000000080)=0x7c) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xe7, "cc0e1eab21fdc21b743104968d94a04638cc055b79b68dc2aa9a6b2aafb19a91094eee02fcd69d126ec78bb038a16a97c2f3c762f03ac3cb99b27a93f5bcc21b29419f3429e4f22f2beefa20526a6830d8a686454306ecb7e2a1b8358de9ab86fa0376b9e708e1507c7a8f5fdc82ac4768b496956814d2a5bb5d617e8e9c2db3d217538a71b62eda9ae21962c99547c55c76f21c690d58cf3a4caa0ab5850942c62d6c6446e906e01596304683c0efc8a2f8fb68cf32e7b8fc27521ce63a77914a3c661c4f017efa7c4e27608d1f822e2b77fba69730537dffc70822cfe824a4df86b5325dadb2"}, &(0x7f0000000200)=0x10b) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x58, "33a24080c31e2b163e60e196c8868be2fd19a5c8d3acce46fafd987fc048271e3394ffbf9de00c20c6f4af94e5ba917d03bae920ba8efbd17bbae6068fb0d9fa0413bf6e115fa46ee4768e6c8c3af4b69c6e5200f95f2773"}, &(0x7f0000000080)=0x7c) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x1, 0x100, 0xb, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x8, 0x7, 0x3c}}) 07:33:01 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x3000000) 07:33:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$audion(&(0x7f0000000040), 0x8000000000000000, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c00682db140f00c853e00001429bd7000fddbdf250a0000004ebcae434fc0171280bd175fadd9b81dda026f4ea95b25f2c17200a0a716e9624b19e20f39c2f8ec6d439ce1ae6f9df5b8c9ab680a292426bd66ff974fd573a03ce7bcc62c780356016766e017186c4b345762f38864bc9ddcd86c84f43933372b160b2aeeab73628ff4874850d3a6c96ca865c5c10cee2b54a6134a6207077bd862eb9427bca417bba746de66ba25e3925c3f8f8201"], 0x14}, 0x1, 0x0, 0x0, 0x48010}, 0x20004004) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x1, r4, 0x10, 0x1, @in6={0xa, 0x4e22, 0xfffff34b, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}}}, 0xa0) 07:33:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000040)=""/78, 0x4e}], 0x2}, 0x40010020) bind$can_j1939(r0, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x0, 0x0, 0xd80e8edd96f0f80e}, 0xfd}, 0x18) (async) bind$can_j1939(r0, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x0, 0x0, 0xd80e8edd96f0f80e}, 0xfd}, 0x18) 07:33:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x1, 0x100, 0xb, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x8, 0x7, 0x3c}}) 07:33:01 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x300000000000000) 07:33:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)) (async) r2 = syz_open_dev$audion(&(0x7f0000000040), 0x8000000000000000, 0x80000) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c00682db140f00c853e00001429bd7000fddbdf250a0000004ebcae434fc0171280bd175fadd9b81dda026f4ea95b25f2c17200a0a716e9624b19e20f39c2f8ec6d439ce1ae6f9df5b8c9ab680a292426bd66ff974fd573a03ce7bcc62c780356016766e017186c4b345762f38864bc9ddcd86c84f43933372b160b2aeeab73628ff4874850d3a6c96ca865c5c10cee2b54a6134a6207077bd862eb9427bca417bba746de66ba25e3925c3f8f8201"], 0x14}, 0x1, 0x0, 0x0, 0x48010}, 0x20004004) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x1, r4, 0x10, 0x1, @in6={0xa, 0x4e22, 0xfffff34b, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}}}, 0xa0) 07:33:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:01 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="30010000", @ANYRES16=r1, @ANYBLOB="000126bd7000fbdbdf25130000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000300020000004000018014000200767863616e3100000000000000000000080003000000000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c000180080003000000000064000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="e979140002e375657468315f0000080003000300000014b3c20cab05880002006970760000007d1a33da2009c84a1731be2419d28cad4e3d266611c7f567c62b26393901b2bf53d98b969af5d84828f632b418dff6bb194c02fa3cf2f2bc9197385885a323daf02e898fdad17ac96da0f396bbe7ce5ee88347793597d603cbc4fa950f0bed3adec84c92cb841ce5a1f295eef7afcd8ffb905fe97cf06c4a789db0016bbdc976fbc59838349b0b1dbe09ca58b196a8f2acb3e54a387a8a81707898c8fc2324ad0000000000000000afc3d477eae2db6ad05706ee846c2cb2c49c72b69401a8f505cebb1387b08c55929f3b15d60422b7a3f5962c984184f26c239664347c9ae7", @ANYRES32=r5, @ANYBLOB="5400018008000300020000001400022cad90af3fb46b8d000000000000000000080003000100000014000200626f6e64300000000000000000000000080003000100000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB], 0x130}, 0x1, 0x0, 0x0, 0x20001}, 0x2400c891) 07:33:01 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x1, 0x100, 0xb, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x8, 0x7, 0x3c}}) 07:33:01 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x210201, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@dev}, 0x0, @in=@private}}, 0xe8) r3 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in=@private=0xa010102, 0x4e22, 0x6, 0x4e22, 0xf88, 0x2, 0x8656855b39ad1ac5, 0x20, 0x5c, r1, r3}, {0x2, 0x8, 0x6, 0x6b8b, 0x9, 0x5, 0x19, 0x100000001}, {0x0, 0x3, 0x0, 0x81}, 0x81, 0x6e6bb3, 0x1, 0x1, 0x0, 0x3}, {{@in=@broadcast, 0x4d6, 0x32}, 0x2, @in=@multicast2, 0x3507, 0x0, 0x3, 0x47, 0x1, 0x9, 0x80000001}}, 0xe8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x3, 0x0, 0x0) 07:33:01 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:01 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="30010000", @ANYRES16=r1, @ANYBLOB="000126bd7000fbdbdf25130000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000300020000004000018014000200767863616e3100000000000000000000080003000000000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c000180080003000000000064000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="5400018008000300020000001400022cad90af3fb46b8d000000000000000000080003000100000014000200626f6e64300000000000000000000000080003000100000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB], 0x130}, 0x1, 0x0, 0x0, 0x20001}, 0x2400c891) 07:33:01 executing program 4: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r3) sendmsg$IEEE802154_LLSEC_LIST_DEV(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_RESP(r4, &(0x7f00000007c0)={&(0x7f0000000700), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r5, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c}, 0x48000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f00000003c0)={0x5, &(0x7f0000000340)=[{}, {}, {@none}, {@fixed}, {}]}) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xffffffffffff0283}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x200}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffed) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, 0x0, 0x0) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r8, 0x302, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200848c4}, 0x4048015) 07:33:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)) syz_open_dev$audion(&(0x7f0000000040), 0x8000000000000000, 0x80000) (async) r2 = syz_open_dev$audion(&(0x7f0000000040), 0x8000000000000000, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c00682db140f00c853e00001429bd7000fddbdf250a0000004ebcae434fc0171280bd175fadd9b81dda026f4ea95b25f2c17200a0a716e9624b19e20f39c2f8ec6d439ce1ae6f9df5b8c9ab680a292426bd66ff974fd573a03ce7bcc62c780356016766e017186c4b345762f38864bc9ddcd86c84f43933372b160b2aeeab73628ff4874850d3a6c96ca865c5c10cee2b54a6134a6207077bd862eb9427bca417bba746de66ba25e3925c3f8f8201"], 0x14}, 0x1, 0x0, 0x0, 0x48010}, 0x20004004) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x1, r4, 0x10, 0x1, @in6={0xa, 0x4e22, 0xfffff34b, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}}}, 0xa0) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="30010000", @ANYRES16=r1, @ANYBLOB="000126bd7000fbdbdf25130000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000300020000004000018014000200767863616e3100000000000000000000080003000000000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c000180080003000000000064000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="e979140002e375657468315f0000080003000300000014b3c20cab05880002006970760000007d1a33da2009c84a1731be2419d28cad4e3d266611c7f567c62b26393901b2bf53d98b969af5d84828f632b418dff6bb194c02fa3cf2f2bc9197385885a323daf02e898fdad17ac96da0f396bbe7ce5ee88347793597d603cbc4fa950f0bed3adec84c92cb841ce5a1f295eef7afcd8ffb905fe97cf06c4a789db0016bbdc976fbc59838349b0b1dbe09ca58b196a8f2acb3e54a387a8a81707898c8fc2324ad0000000000000000afc3d477eae2db6ad05706ee846c2cb2c49c72b69401a8f505cebb1387b08c55929f3b15d60422b7a3f5962c984184f26c239664347c9ae7", @ANYRES32=r5, @ANYBLOB="5400018008000300020000001400022cad90af3fb46b8d000000000000000000080003000100000014000200626f6e64300000000000000000000000080003000100000008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB], 0x130}, 0x1, 0x0, 0x0, 0x20001}, 0x2400c891) 07:33:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x40008000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x8002, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000300)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[{}, {}], 0x0, 0x0, '\x00', 0x6, 0x2}) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) userfaultfd(0x80000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7ff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8004}, 0x14) 07:33:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x210201, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@dev}, 0x0, @in=@private}}, 0xe8) r3 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in=@private=0xa010102, 0x4e22, 0x6, 0x4e22, 0xf88, 0x2, 0x8656855b39ad1ac5, 0x20, 0x5c, r1, r3}, {0x2, 0x8, 0x6, 0x6b8b, 0x9, 0x5, 0x19, 0x100000001}, {0x0, 0x3, 0x0, 0x81}, 0x81, 0x6e6bb3, 0x1, 0x1, 0x0, 0x3}, {{@in=@broadcast, 0x4d6, 0x32}, 0x2, @in=@multicast2, 0x3507, 0x0, 0x3, 0x47, 0x1, 0x9, 0x80000001}}, 0xe8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x3, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x3, 0x0, 0x0) 07:33:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x80800, 0x0, 0xffffffffffffffff}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000003c0)={r1, 0x9}) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) ioctl$IMDELTIMER(r4, 0x80044941, &(0x7f0000000380)=0x2) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, r5}}, 0x18) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x6, 0x0, {"b2a18eea033d20ca13a915cc7a0086d8"}, 0xffffffff8fde2cbe, 0x8, 0x58ba}}}, 0xa0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) connect$can_bcm(r8, &(0x7f0000000480), 0x10) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x3ff, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', r0, 0x29, 0x7, 0x8, 0x8, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0xfc20, 0x401}}) sendto(0xffffffffffffffff, &(0x7f0000000240)="6839dbc9ac1d7d43412e56b9436859a0e16ae13fca751359b43da5ca2fde91f27be32ce980424bf8b87398a8bc36480dcecdabe60b467114d6d8004c9df8e3d609da569822173e3770edeb4275d8a1f82054a29d06715b0622bbc9dafc7ac0dc77df8c3433e40bf6b46e405a86048439b99b127d1e4735ffc41d0e6a01232f0ff29f294fe809dee2e8485afd5b7afb52a89fab4efc016b51f8d73ab0a3573b39b56d69b95a2fce15519ecdbfdbf7313e79cf89a7", 0xb4, 0x11, 0x0, 0x0) 07:33:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x40008000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x8002, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000300)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[{}, {}], 0x0, 0x0, '\x00', 0x6, 0x2}) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) userfaultfd(0x80000) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7ff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8004}, 0x14) 07:33:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x210201, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@dev}, 0x0, @in=@private}}, 0xe8) r3 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in=@private=0xa010102, 0x4e22, 0x6, 0x4e22, 0xf88, 0x2, 0x8656855b39ad1ac5, 0x20, 0x5c, r1, r3}, {0x2, 0x8, 0x6, 0x6b8b, 0x9, 0x5, 0x19, 0x100000001}, {0x0, 0x3, 0x0, 0x81}, 0x81, 0x6e6bb3, 0x1, 0x1, 0x0, 0x3}, {{@in=@broadcast, 0x4d6, 0x32}, 0x2, @in=@multicast2, 0x3507, 0x0, 0x3, 0x47, 0x1, 0x9, 0x80000001}}, 0xe8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x3, 0x0, 0x0) 07:33:02 executing program 4: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r3) sendmsg$IEEE802154_LLSEC_LIST_DEV(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_RESP(r4, &(0x7f00000007c0)={&(0x7f0000000700), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r5, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c}, 0x48000) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f00000003c0)={0x5, &(0x7f0000000340)=[{}, {}, {@none}, {@fixed}, {}]}) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xffffffffffff0283}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x200}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffed) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, 0x0, 0x0) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r8, 0x302, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200848c4}, 0x4048015) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r3) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) (async) sendmsg$IEEE802154_ASSOCIATE_RESP(r4, &(0x7f00000007c0)={&(0x7f0000000700), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r5, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c}, 0x48000) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f00000003c0)={0x5, &(0x7f0000000340)=[{}, {}, {@none}, {@fixed}, {}]}) (async) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xffffffffffff0283}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x200}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) (async) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffed) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, 0x0, 0x0) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r8, 0x302, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200848c4}, 0x4048015) (async) 07:33:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x80800}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x80800, 0x0, 0xffffffffffffffff}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000003c0)={r1, 0x9}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) (async) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) ioctl$IMDELTIMER(r4, 0x80044941, &(0x7f0000000380)=0x2) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, r5}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x6, 0x0, {"b2a18eea033d20ca13a915cc7a0086d8"}, 0xffffffff8fde2cbe, 0x8, 0x58ba}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x6, 0x0, {"b2a18eea033d20ca13a915cc7a0086d8"}, 0xffffffff8fde2cbe, 0x8, 0x58ba}}}, 0xa0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) connect$can_bcm(r8, &(0x7f0000000480), 0x10) (async) connect$can_bcm(r8, &(0x7f0000000480), 0x10) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000440)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x3ff, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', r0, 0x29, 0x7, 0x8, 0x8, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0xfc20, 0x401}}) (async) sendto(0xffffffffffffffff, &(0x7f0000000240)="6839dbc9ac1d7d43412e56b9436859a0e16ae13fca751359b43da5ca2fde91f27be32ce980424bf8b87398a8bc36480dcecdabe60b467114d6d8004c9df8e3d609da569822173e3770edeb4275d8a1f82054a29d06715b0622bbc9dafc7ac0dc77df8c3433e40bf6b46e405a86048439b99b127d1e4735ffc41d0e6a01232f0ff29f294fe809dee2e8485afd5b7afb52a89fab4efc016b51f8d73ab0a3573b39b56d69b95a2fce15519ecdbfdbf7313e79cf89a7", 0xb4, 0x11, 0x0, 0x0) 07:33:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10402, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000740), 0x521680, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x35cd, 0x7, 0xf9, 0xd52, r1, 0x23, '\x00', 0x0, r2, 0x4, 0x0, 0x3, 0x6}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r4) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000006c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r5, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = syz_open_dev$audion(&(0x7f00000001c0), 0x100, 0xc00000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x8, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x4, 0x0, 0x3, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffe0}, @call={0x85, 0x0, 0x0, 0x3c}, @generic={0x1, 0x0, 0x6, 0x200, 0x400}], &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, &(0x7f0000000080), 0x40f00, 0x9, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x1, 0xee49}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000200)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, r6]}, 0x80) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x82201, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xf, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x0, 0xb, 0xffffffffffffffe0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa55}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x6, 0xbf088ed19c62839, 0xb, 0x4, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @cb_func={0x18, 0xb49bc3dd27fe8b88, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x31c314ba, 0xd7, &(0x7f0000000380)=""/215, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r8, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x3, 0x80000000, 0x10001}, 0x10, 0xffffffffffffffff}, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x3, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x40c081, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x6, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x9, 0x3, 0x7, 0x6, 0x8}]}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x5, 0x80000001, 0x2}, 0x10, 0x27b1b, r10, 0x0, &(0x7f00000008c0)=[r2, 0xffffffffffffffff, r1]}, 0x80) 07:33:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x80800, 0x0, 0xffffffffffffffff}) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000003c0)={r1, 0x9}) (async) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) ioctl$IMDELTIMER(r4, 0x80044941, &(0x7f0000000380)=0x2) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, r5}}, 0x18) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg0\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x6, 0x0, {"b2a18eea033d20ca13a915cc7a0086d8"}, 0xffffffff8fde2cbe, 0x8, 0x58ba}}}, 0xa0) (async) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, 0x0, 0x0) connect$can_bcm(r8, &(0x7f0000000480), 0x10) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000440)) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) 07:33:02 executing program 4: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r3) sendmsg$IEEE802154_LLSEC_LIST_DEV(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) (async) sendmsg$IEEE802154_ASSOCIATE_RESP(r4, &(0x7f00000007c0)={&(0x7f0000000700), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r5, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c}, 0x48000) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f00000003c0)={0x5, &(0x7f0000000340)=[{}, {}, {@none}, {@fixed}, {}]}) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xffffffffffff0283}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x200}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) (async, rerun: 64) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffed) (rerun: 64) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, 0x0, 0x0) (async, rerun: 64) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) (rerun: 64) sendmsg$IEEE802154_LLSEC_ADD_DEV(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r8, 0x302, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200848c4}, 0x4048015) 07:33:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10402, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000740), 0x521680, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x35cd, 0x7, 0xf9, 0xd52, r1, 0x23, '\x00', 0x0, r2, 0x4, 0x0, 0x3, 0x6}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r4) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000006c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r5, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = syz_open_dev$audion(&(0x7f00000001c0), 0x100, 0xc00000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x8, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x4, 0x0, 0x3, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffe0}, @call={0x85, 0x0, 0x0, 0x3c}, @generic={0x1, 0x0, 0x6, 0x200, 0x400}], &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, &(0x7f0000000080), 0x40f00, 0x9, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x1, 0xee49}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000200)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, r6]}, 0x80) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x82201, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xf, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x0, 0xb, 0xffffffffffffffe0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa55}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x6, 0xbf088ed19c62839, 0xb, 0x4, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @cb_func={0x18, 0xb49bc3dd27fe8b88, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x31c314ba, 0xd7, &(0x7f0000000380)=""/215, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r8, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x3, 0x80000000, 0x10001}, 0x10, 0xffffffffffffffff}, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x3, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x40c081, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x6, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x9, 0x3, 0x7, 0x6, 0x8}]}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x5, 0x80000001, 0x2}, 0x10, 0x27b1b, r10, 0x0, &(0x7f00000008c0)=[r2, 0xffffffffffffffff, r1]}, 0x80) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10402, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000740), 0x521680, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x35cd, 0x7, 0xf9, 0xd52, r1, 0x23, '\x00', 0x0, r2, 0x4, 0x0, 0x3, 0x6}, 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r4) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000006c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r5, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) syz_open_dev$audion(&(0x7f00000001c0), 0x100, 0xc00000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x8, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x4, 0x0, 0x3, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffe0}, @call={0x85, 0x0, 0x0, 0x3c}, @generic={0x1, 0x0, 0x6, 0x200, 0x400}], &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, &(0x7f0000000080), 0x40f00, 0x9, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x1, 0xee49}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000200)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, r6]}, 0x80) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x82201, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xf, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x0, 0xb, 0xffffffffffffffe0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa55}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x6, 0xbf088ed19c62839, 0xb, 0x4, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @cb_func={0x18, 0xb49bc3dd27fe8b88, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x31c314ba, 0xd7, &(0x7f0000000380)=""/215, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r8, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x3, 0x80000000, 0x10001}, 0x10, 0xffffffffffffffff}, 0x80) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x3, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x40c081, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x6, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x9, 0x3, 0x7, 0x6, 0x8}]}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x5, 0x80000001, 0x2}, 0x10, 0x27b1b, r10, 0x0, &(0x7f00000008c0)=[r2, 0xffffffffffffffff, r1]}, 0x80) (async) 07:33:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$IEEE802154_LLSEC_LIST_DEV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x40008000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x8002, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000300)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[{}, {}], 0x0, 0x0, '\x00', 0x6, 0x2}) (async, rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (rerun: 32) userfaultfd(0x80000) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7ff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8004}, 0x14) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x3ff, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', r0, 0x29, 0x7, 0x8, 0x8, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0xfc20, 0x401}}) sendto(0xffffffffffffffff, &(0x7f0000000240)="6839dbc9ac1d7d43412e56b9436859a0e16ae13fca751359b43da5ca2fde91f27be32ce980424bf8b87398a8bc36480dcecdabe60b467114d6d8004c9df8e3d609da569822173e3770edeb4275d8a1f82054a29d06715b0622bbc9dafc7ac0dc77df8c3433e40bf6b46e405a86048439b99b127d1e4735ffc41d0e6a01232f0ff29f294fe809dee2e8485afd5b7afb52a89fab4efc016b51f8d73ab0a3573b39b56d69b95a2fce15519ecdbfdbf7313e79cf89a7", 0xb4, 0x11, 0x0, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x3ff, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', r0, 0x29, 0x7, 0x8, 0x8, 0x20, @dev={0xfe, 0x80, '\x00', 0x12}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0xfc20, 0x401}}) (async) sendto(0xffffffffffffffff, &(0x7f0000000240)="6839dbc9ac1d7d43412e56b9436859a0e16ae13fca751359b43da5ca2fde91f27be32ce980424bf8b87398a8bc36480dcecdabe60b467114d6d8004c9df8e3d609da569822173e3770edeb4275d8a1f82054a29d06715b0622bbc9dafc7ac0dc77df8c3433e40bf6b46e405a86048439b99b127d1e4735ffc41d0e6a01232f0ff29f294fe809dee2e8485afd5b7afb52a89fab4efc016b51f8d73ab0a3573b39b56d69b95a2fce15519ecdbfdbf7313e79cf89a7", 0xb4, 0x11, 0x0, 0x0) (async) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:33:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delneigh={0x60, 0x1d, 0x200, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x0, r1, 0x40, 0x4, 0x6}, [@NDA_SRC_VNI={0x8}, @NDA_PROBES={0x8, 0x4, 0x3ff}, @NDA_LLADDR={0xa}, @NDA_SRC_VNI={0x8, 0xb, 0x1}, @NDA_DST_MAC={0xa}, @NDA_VNI={0x8}, @NDA_LLADDR={0xa, 0x2, @local}]}, 0x60}}, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x800, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vxcan0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6}, 0x10) 07:33:02 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xfffffffffffffdb5) 07:33:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delneigh={0x60, 0x1d, 0x200, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x0, r1, 0x40, 0x4, 0x6}, [@NDA_SRC_VNI={0x8}, @NDA_PROBES={0x8, 0x4, 0x3ff}, @NDA_LLADDR={0xa}, @NDA_SRC_VNI={0x8, 0xb, 0x1}, @NDA_DST_MAC={0xa}, @NDA_VNI={0x8}, @NDA_LLADDR={0xa, 0x2, @local}]}, 0x60}}, 0x40000) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10402, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10402, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000740), 0x521680, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x35cd, 0x7, 0xf9, 0xd52, r1, 0x23, '\x00', 0x0, r2, 0x4, 0x0, 0x3, 0x6}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r4) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r4) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000006c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r5, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = syz_open_dev$audion(&(0x7f00000001c0), 0x100, 0xc00000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x8, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x4, 0x0, 0x3, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffe0}, @call={0x85, 0x0, 0x0, 0x3c}, @generic={0x1, 0x0, 0x6, 0x200, 0x400}], &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, &(0x7f0000000080), 0x40f00, 0x9, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x1, 0xee49}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000200)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, r6]}, 0x80) socket$inet6_udp(0xa, 0x2, 0x0) (async) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x82201, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xf, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x0, 0xb, 0xffffffffffffffe0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa55}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x6, 0xbf088ed19c62839, 0xb, 0x4, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @cb_func={0x18, 0xb49bc3dd27fe8b88, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x31c314ba, 0xd7, &(0x7f0000000380)=""/215, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r8, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x3, 0x80000000, 0x10001}, 0x10, 0xffffffffffffffff}, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x3, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x40c081, 0x0) (async) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x40c081, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x6, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x9, 0x3, 0x7, 0x6, 0x8}]}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x5, 0x80000001, 0x2}, 0x10, 0x27b1b, r10, 0x0, &(0x7f00000008c0)=[r2, 0xffffffffffffffff, r1]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x6, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x9, 0x3, 0x7, 0x6, 0x8}]}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000840)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x5, 0x80000001, 0x2}, 0x10, 0x27b1b, r10, 0x0, &(0x7f00000008c0)=[r2, 0xffffffffffffffff, r1]}, 0x80) 07:33:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x800, 0x0, 0xffffffffffffffff}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vxcan0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6}, 0x10) 07:33:02 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xfffffffffffffdb5) 07:33:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x1, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x17, 0x700, 0x1, 0x5}}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={0x1d, r1}, 0x10) socketpair(0x2c, 0x1, 0xffffffff, &(0x7f0000000000)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00'}) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x0, 0x8, 0x4, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x8, 0x2}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xffffffffffffff89) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delneigh={0x60, 0x1d, 0x200, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x0, r1, 0x40, 0x4, 0x6}, [@NDA_SRC_VNI={0x8}, @NDA_PROBES={0x8, 0x4, 0x3ff}, @NDA_LLADDR={0xa}, @NDA_SRC_VNI={0x8, 0xb, 0x1}, @NDA_DST_MAC={0xa}, @NDA_VNI={0x8}, @NDA_LLADDR={0xa, 0x2, @local}]}, 0x60}}, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socketpair(0x3e, 0x6, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', r3, 0x29, 0x3f, 0x3, 0x5, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}, @mcast1, 0x20, 0x700, 0x6, 0x5f2}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0xeb, 0x20, 0x2, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x81, 0x7fff, 0x7fffffff}}) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x800, 0x0, 0xffffffffffffffff}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vxcan0\x00'}) (async) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6}, 0x10) 07:33:03 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0xfffffffffffffdb5) bpf$MAP_CREATE(0x3, 0x0, 0xfffffffffffffdb5) (async) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x11, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:03 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x40fec3e5d6d8e6f4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x1, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x17, 0x700, 0x1, 0x5}}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={0x1d, r1}, 0x10) socketpair(0x2c, 0x1, 0xffffffff, &(0x7f0000000000)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00'}) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x0, 0x8, 0x4, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x8, 0x2}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xffffffffffffff89) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x1, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x17, 0x700, 0x1, 0x5}}) (async) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={0x1d, r1}, 0x10) (async) socketpair(0x2c, 0x1, 0xffffffff, &(0x7f0000000000)) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00'}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00'}) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x0, 0x8, 0x4, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x8, 0x2}}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xffffffffffffff89) (async) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x5521df5e, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0x1, 0x2, 0xb89, 0x1, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x8000, 0x7, 0x10000}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fedbdf25130000007000018008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="14000200766c616e3000000000000000000000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="2000018008000100765c5bc41b6d1d8e6647e4dead95b89183d5089276df55cb0737d5ae4e0ec8c493367c5d7b5b7c13978d5df6e2c2efc9e069086e64aeac20e2002ec1f18f279cab39dd90e12c84777565907fb4", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f68737200000000"], 0xa4}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) (async) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) (async) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) (async) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x40fec3e5d6d8e6f4) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:33:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) socketpair(0x3e, 0x6, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', r3, 0x29, 0x3f, 0x3, 0x5, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}, @mcast1, 0x20, 0x700, 0x6, 0x5f2}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0xeb, 0x20, 0x2, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x81, 0x7fff, 0x7fffffff}}) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0x1, 0x2, 0xb89, 0x1, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x8000, 0x7, 0x10000}}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fedbdf25130000007000018008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="14000200766c616e3000000000000000000000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="2000018008000100765c5bc41b6d1d8e6647e4dead95b89183d5089276df55cb0737d5ae4e0ec8c493367c5d7b5b7c13978d5df6e2c2efc9e069086e64aeac20e2002ec1f18f279cab39dd90e12c84777565907fb4", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f68737200000000"], 0xa4}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x1, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x17, 0x700, 0x1, 0x5}}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={0x1d, r1}, 0x10) socketpair(0x2c, 0x1, 0xffffffff, &(0x7f0000000000)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00'}) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x0, 0x8, 0x4, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x8, 0x2}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xffffffffffffff89) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x1, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x17, 0x700, 0x1, 0x5}}) (async) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={0x1d, r1}, 0x10) (async) socketpair(0x2c, 0x1, 0xffffffff, &(0x7f0000000000)) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00'}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00'}) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x0, 0x8, 0x4, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x8, 0x2}}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0xffffffffffffff89) (async) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) (async) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) (async) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) (async) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x40fec3e5d6d8e6f4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0x1, 0x2, 0xb89, 0x1, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x8000, 0x7, 0x10000}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fedbdf25130000007000018008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="14000200766c616e3000000000000000000000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="2000018008000100765c5bc41b6d1d8e6647e4dead95b89183d5089276df55cb0737d5ae4e0ec8c493367c5d7b5b7c13978d5df6e2c2efc9e069086e64aeac20e2002ec1f18f279cab39dd90e12c84777565907fb4", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f68737200000000"], 0xa4}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) (async) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fedbdf25130000007000018008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="14000200766c616e3000000000000000000000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="2000018008000100765c5bc41b6d1d8e6647e4dead95b89183d5089276df55cb0737d5ae4e0ec8c493367c5d7b5b7c13978d5df6e2c2efc9e069086e64aeac20e2002ec1f18f279cab39dd90e12c84777565907fb4", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f68737200000000"], 0xa4}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000000)={@none, 0x8}) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@bloom_filter={0x1e, 0xa78, 0x1, 0x0, 0x4, 0xffffffffffffffff, 0x151, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000200), 0x80, 0x200000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000440)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x5, r3, 0xb0b0b0b0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x80, 0x0, 0x4, 0x70bd2f, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x80}}, 0x4048060) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socketpair(0x3e, 0x6, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', r3, 0x29, 0x3f, 0x3, 0x5, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}, @mcast1, 0x20, 0x700, 0x6, 0x5f2}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0xeb, 0x20, 0x2, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x81, 0x7fff, 0x7fffffff}}) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) socketpair(0x3e, 0x6, 0x3, &(0x7f0000000000)) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', r3, 0x29, 0x3f, 0x3, 0x5, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}, @mcast1, 0x20, 0x700, 0x6, 0x5f2}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0xeb, 0x20, 0x2, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x81, 0x7fff, 0x7fffffff}}) (async) 07:33:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00', 0x1}}) bpf$MAP_CREATE(0x3, 0x0, 0x4995cda1b4076066) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r1, 0x29, 0x0, 0x1, 0x7, 0x47, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x20, 0x4, 0xffff}}) 07:33:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x7800, 0x4, 0x490}}) 07:33:03 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@bloom_filter={0x1e, 0xa78, 0x1, 0x0, 0x4, 0xffffffffffffffff, 0x151, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000200), 0x80, 0x200000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000440)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x5, r3, 0xb0b0b0b0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x80, 0x0, 0x4, 0x70bd2f, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x80}}, 0x4048060) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@bloom_filter={0x1e, 0xa78, 0x1, 0x0, 0x4, 0xffffffffffffffff, 0x151, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80000}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) (async) syz_open_dev$dri(&(0x7f0000000200), 0x80, 0x200000) (async) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2}) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000440)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x5, r3, 0xb0b0b0b0}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)) (async) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x80, 0x0, 0x4, 0x70bd2f, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x80}}, 0x4048060) (async) 07:33:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000000)={@none, 0x8}) (async) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000000)={@none, 0x8}) 07:33:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00', 0x1}}) bpf$MAP_CREATE(0x3, 0x0, 0x4995cda1b4076066) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r1, 0x29, 0x0, 0x1, 0x7, 0x47, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x20, 0x4, 0xffff}}) 07:33:04 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000000)={@none, 0x8}) 07:33:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x0, 0x4, 0x490}}) 07:33:04 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@bloom_filter={0x1e, 0xa78, 0x1, 0x0, 0x4, 0xffffffffffffffff, 0x151, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000200), 0x80, 0x200000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000440)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x5, r3, 0xb0b0b0b0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x80, 0x0, 0x4, 0x70bd2f, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x80}}, 0x4048060) 07:33:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="65c492a82501f610af22d46c450fbb5e42b2014fcd2270e3d207766660e0a5a5cb4e0676dfc7a2b9da813b695b2b1e46d1fad00ee254212f84795e3adffc1708ada06c5d6ec46aeb99c668be5150a0ec49f111bd458e8191c2b9404a70aedfcab7621d49e3f4071285a2c5fdea3e", &(0x7f0000000100)=""/227, &(0x7f0000000200)="dadc624a11732f78cda79767ea8cff074e1280b700b3e3b52f736ee9c56a297619352a5b9d8b57c4bb3db478d917478cfb6d8d7705f2f740fe6092d8217c62377413c570e972a33fcbf486c92e3083db8f9d9b29545911e68a3b33d2ede639eb3ad1e056f373056d3b60dcd61ee188f0f039d53463b8586afaaa95e3f143666642164f42f5b45da21619d1e732ea88e60aaa49005acf5c095bb8ebfd866978f4134b9e10a37229855a53b68315e415b365d9e93d33b7", &(0x7f0000000380)="b9f4bae414cc2402df658eb6e689c668dc0bf30c6894c6a77d88dc6f23c507b74abed3095652699b6277e65b9aeb1816051cfe4b1eb3fcadb81feb42558abe67b25f785a127c6968c345b40843c3ad0c8c62c3ac389d8cd234811b2309537c1b66cfc367b6cebff85835ba4c02179e754a6faa9bb073112ba99dc824b0603f37276662d53b6caf9fb236656483dc13117260294f30dcdc7fd9a09403a0a41fbb983a4418ce5a1b89166f0771d0b872d5f7d8cd642155a23f051dd2d7f51540c5dc147a19868b68763c71555c0b818e3a78d12201a33fc3cbec0efc2177c2cd09d21be3f7a96ee65b27bab198a0a3", 0x5, r2}, 0x38) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x3, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x84e41, 0x0) 07:33:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040000) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0x0) 07:33:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00', 0x1}}) bpf$MAP_CREATE(0x3, 0x0, 0x4995cda1b4076066) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r1, 0x29, 0x0, 0x1, 0x7, 0x47, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x20, 0x4, 0xffff}}) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00', 0x1}}) (async) bpf$MAP_CREATE(0x3, 0x0, 0x4995cda1b4076066) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r1, 0x29, 0x0, 0x1, 0x7, 0x47, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x20, 0x4, 0xffff}}) (async) 07:33:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x2, 0x401, "206fa5c5b744496be694bc931c27dfc47a22c4ea7e5915cca358860f5f22a89ae7bd1c80e78c301474dd194ad9fe283060fccfc965d3d569a9ea5ce42e35ab8508eead73d148c03236b84d4f4f98afa2ee7cacd8d025a10a1e07ef40384108fdf8f77c3af6c77e9b221e036ce9faffd0be352c21ea66b1a239d7e177bc0cd3746de818e03081d1f97bc5587f75cb649f2369e42d48f2c8a6e43435fb1e641439bae2b46d8045b69fe5c31fe770f992f02587a44d9b3bd0d48b36ad6976b22996a0946b8cd45d55f64a9c1991ef9bb50034ac14c77ff0ce3bcae1981832131bd6335ec5c6fd3eff23d078ab1287d70155afb2d9083666dca62333321825fe8619", 0x0, 0x4, 0x5, 0x0, 0x9}, r5}}, 0x120) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x4, 0x9, "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", 0x0, 0x6, 0x40, 0x80, 0x8, 0x2}}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:04 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x101100, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3622}, [@alu={0x4, 0x1, 0x5, 0x3, 0x1, 0xffffffffffffffe0, 0x4}, @generic={0x5, 0x0, 0x6, 0x4, 0x6}, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x1, 0xd, 0xb, 0x3, 0x80, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x2, 0x5, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000500)='syzkaller\x00', 0xffffffff, 0x91, &(0x7f0000000540)=""/145, 0x1f00, 0x11, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xf, 0xb0}, 0x10, 0xd2a5, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[r0, r0]}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendto(r2, &(0x7f0000000180)="1597edc4a69b0938ad902a821f619fadce18ed09bd04a40a89e2891c264182a7e4748edfd373cf09eb74bd920cbf986c195e5b0edfaaa110db3236be909b6e25f4ce654838f019405b826607fea59351ec5f8b80337b49b53846cd612157a6391f996bfaf16259de5f6646dd07b88fc568d39c3db47f20c492236b30311eda8e02d1e530de98c0a5cf1c76a22f00ce0cdd56a9b2a0092468db585f477cdc777a5fab7f", 0xa3, 0x20000001, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x3, {0xa, 0x4e23, 0x7, @mcast2, 0xc51}}}, 0x38) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25090000faffffff000100000005003000000000de07000000020000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r3, 0x8, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xe619}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x88}, 0x884) 07:33:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="65c492a82501f610af22d46c450fbb5e42b2014fcd2270e3d207766660e0a5a5cb4e0676dfc7a2b9da813b695b2b1e46d1fad00ee254212f84795e3adffc1708ada06c5d6ec46aeb99c668be5150a0ec49f111bd458e8191c2b9404a70aedfcab7621d49e3f4071285a2c5fdea3e", &(0x7f0000000100)=""/227, &(0x7f0000000200)="dadc624a11732f78cda79767ea8cff074e1280b700b3e3b52f736ee9c56a297619352a5b9d8b57c4bb3db478d917478cfb6d8d7705f2f740fe6092d8217c62377413c570e972a33fcbf486c92e3083db8f9d9b29545911e68a3b33d2ede639eb3ad1e056f373056d3b60dcd61ee188f0f039d53463b8586afaaa95e3f143666642164f42f5b45da21619d1e732ea88e60aaa49005acf5c095bb8ebfd866978f4134b9e10a37229855a53b68315e415b365d9e93d33b7", &(0x7f0000000380)="b9f4bae414cc2402df658eb6e689c668dc0bf30c6894c6a77d88dc6f23c507b74abed3095652699b6277e65b9aeb1816051cfe4b1eb3fcadb81feb42558abe67b25f785a127c6968c345b40843c3ad0c8c62c3ac389d8cd234811b2309537c1b66cfc367b6cebff85835ba4c02179e754a6faa9bb073112ba99dc824b0603f37276662d53b6caf9fb236656483dc13117260294f30dcdc7fd9a09403a0a41fbb983a4418ce5a1b89166f0771d0b872d5f7d8cd642155a23f051dd2d7f51540c5dc147a19868b68763c71555c0b818e3a78d12201a33fc3cbec0efc2177c2cd09d21be3f7a96ee65b27bab198a0a3", 0x5, r2}, 0x38) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x3, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x84e41, 0x0) 07:33:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x0, 0x4, 0x490}}) 07:33:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040000) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0x0) 07:33:04 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000000)="591ebcb26da28e2cfc6f72cd5719fd3e6e4260dae73b49cf1068a57fee492f00fe5513416277dc8256dcd6d704678d94bf1365b0589ecf1a906c68ca77c647f961cf0eb09a21c28a3afcab6d1a39f1056ed1adec6070efb9c9e7a056630d1a4d08e5827edbea1435b72a1905773eef94cd86ee8c189b95127ed57fd904aaf424ed659de53a52a0f4adec691ca9d82a680f6e1ce1252b9d57a772e7e8e6f60dbe18d647d7e73e44dea8e275e8fcd7866b1da6b895d6c6696a79c5715d27fabc930edf7dc958bd22c2e6adddeea805ff25d753c6ed15cb54f58d08a694b5b6ad3b8984209cb2865835a12835332954fec14254a7ed51b1c858985eb27eedf1686629fd1df6f8a57e5dc900d1139562d62d134761f5244a41bf63ea23769d2ef0787735a33159e1f13f3eabece2c0d5f2fc43f6ae4cfe539b871aaef90cc9d2b287c060cfe0af61f39574d59622d2c2ec91f585cdf98c71c6d15448a1740491785e9a43b0e56fb42e212f24a6490d396d1e265f12eca82eba54db4b3e2676d94f857fdd3c1f2ea22fe460fea8c409415a76472ced13454524dbf7722d87fd526efb4ef30b65c9c7a862254d1c59f98ec5503b73f3fa02e01309ddb7e602a0c521f80f8c68062c71ec03b80217e4ccf4218c2ba21bfb31888197276dd72e4003ef793ddc92c2ef894e7e1a77e6433da28aa7e16ec65e8cd9748d614054ddcfb3e0111d29ef9d52079a6c55e1e739909ad3ff7057ebaa55a83421e68ce46a7f8b0d9679f95440dc866b7ee3850023b7f1a880c36c720c963cddd4f17545c1b06e6eabd258eb1fb850e4735427126ac619b2290ace5f1fcb1a1e8cf3587021b05d1546afb1383b9c1b9dc341c615f88e01d0e7a1fb1d9721b8843f89d5a494933c396c7439a0756484b01131b123428e036d0e99e48e95bdfdbcbf50c8c9208b503abb4555dd883408d05fd8a2df47c1ee57ddccfbe06bd6b981714ac5a3806613dcce36bdf1cfe41616ca34f6bc5e419059ee7efe1980a2c1846ad838dc1c8ec1190ff1c987554dd27c2f84918981066a6cfee75abeb8ed8de1f5f0025fcc394b60a27e2845ad9cd1b81c6fd72850b5551ffeb8d5bec563bc721331c63f0e334c2ee1dfed204467786b1acfc47a8d6f7fb0e4ea3fe6690b317bf9868919b5d9642d3105e4092492ef727ffc26a86e15af30b0ff79463dd181a97dd206a6005b2f80db2727c458c54978e88dc46b0683868b298d11a75c85dddb01ad643db3277f7a481d452d777913f8c3ea75b7646a85397d6223869fc9ff0ccabf2abded15418a2d6e68c43df7b0933194e7eb9be378e12f41134f6af9fbda25a77917e4d9394df2217ce14f1f04dab096f00eb1b9d332022d49aa9afe9f6af115721d32389015d9ccbb1d4722d1a6e46881fde65de838603cdfddcd9b72ad74a1b11887d37565baf1f2bf877f95f006430c5b585aff9c9b167122478eafda95d356dac915d64e2e8a20dcea364fbf2b1648aa0b0355d95983fae852cce80f9388a7f2bb905ef8eec07c01d6f359b096716dcc5757630b0e9fcb4295fe077cd3bf51047822f6c04dd9ee1698456bedfe5eb940369a2f2ef03312d11901f96b5e75722eeb91901c0422e15184e3f15cbe86ae87f4a5cfff3db58f51c3b456e7ea38303768d3d8300bd64e423ef0ae7360f2d2958406c76b95fcce889058163d868a05099bf9f9be91e1794eeb8697bf1bebbd71a6e6aa21eeee3f140308a44463863a84a1edf33fa63ccebe0f1eaeb19ca239b5ab36a59eaebd5a50da45df91f7ad31a2883698a47eb61a6812d66cd1861781f9d9762b5232b6d15d954001073acbe68cc16c37cdd2590741075ea47a0f8b90b51b596fc5cc2ca4a07facbab99863f36539cc1c65ca230b503624491893241228f825fd5de0487f34ef64d54fa098d03906a2b7068936e579df66b724ecabe8a1bace41f4782397b47a55b77f1ec59ec87382c9110ede545638926c143a23f0ff9e6b42750644084b5cb55eeae348a0636159d2000521beb4e4b226d6e411e19f4d17048930851c8c14c09a2b456799d3f1b387a392bdc1264dd9d0ffcb4bf60b8d2285224ba289d6d3c961986c802971992560f23e331cb68d1600672ed93d9eef272770a2cac26d880e2a7970c66026caedc1d30d178297488bd81125de98cd860018c8e6910585620eb09179002f65d213c31e73af97217d9a1ab29e2bda9846959e39fa1c03a13fa6c9969081a9c3edab6e49918849ebc251529e221a60d9c222057ca1aa00d9eca8d2bdba453c99fc6d8bb74ed20806b48554db92adf32894053e521cfb592d078e414cf84385b1b7901c707f980082eaca15e3966770a9cbc85b239509c6a72221a1009ce115ab90fd6430368345df3fb665f45b5015f7bbc564e1a0d16454b3eb2ffa9535155ac143d851631f9cb5d27fad998affa7cf6e20e277d6a58edb2846452f743d7ae29d1d3f8a452df30db9c425201f1a081d1668259ea7ce85df6be4feeba05f10a672c7583346f10c015e36828a6c435be52d915856cfdc9f12f05ec85f9b2ae834c67fbeaaa960dff10bf9cdcc7d3672d64c7c34b10db2c39a2921de7e38d8af7c8639d54575c9db12c0ee576539c93754f9934a1d06ecd82430a2e2494b54bce8105ac68333bc1213af587a59d53b3e161028c0bd6d20309e47b68c8fa7793ab595cbd311ab243c608bab0950d888f8a00a2756e99c23397f2ea584ad4689cca976e72d2646a059fdcb6c3a3524af0a0ed18d5a4478b5b834431406068c2c891c9a72cbee18864a43bb6a101ca57dd6cf2903385075fad3160a89ffcc5e28c71a513732f0552afcc76d945b7f52653c184de09346ce4e7950c317af0869bf7e6976e9692bbf6683699291bae2fc82fe5dbd765188b9627e20c1f861c8f105164d98b435eb139003ececc05d93aa913675564ba20a4c3236b3bb6d923a4ca6a70bfbac6f73e5296951b12a880d5775779fa3ada9770f38366321eb67c82c99ef0142ba665834898420af09b30728e42143e92822ad143941742160eaf35904a11029d346336c0541ae3862682aba8111804a3405ce2dafc67b07554299d2814be64c7970e871e60ffbd08044a6c8a6638fcb7c64cfd1477a45a59e29f57b6149077b5c44a91781bc6dba98f099b480551d21d8c5e8ea71b352d2fdb7085f2a2e8e604673b8e9757cbee01f6c9534cfd293e3ad5ac7f91cd11fe90f94f7616811cc16b110c9ca142db907290c0b587eb7392edbca09fc24ba3655c28b4f1712dcc0a195c7b4a8551850a06f92ebc899d4846d7a2c0b90a26c2b3331f0d1d02573d49396d5e7384040f077e08db15454c4be73214b16416a09d535af15296d671ce966fbe1f0691c399599a476d40c887e1d939a113634d49c747f78684e321018e7c2a7d2cc0df42a4d6eee2c6829cbdbed8d5e8553e630a06bcf17e0a0036afd98ba1f797b9708c287695fba7b6309d6457a969677d44a0a3f9db3c990fa858f73e992ff988ce45b299e1ff8ff30b977592f3b1ab2ca481f032346279813ee36eae9f4ea710d27d23ffedb4d909158cb39b6b73010dc22f4ab6465cdb31e0178497b11d4a16852199d8b2444b9a76c76e25971f6897e834970cd0d2f9937e29a52acfacae290476775a165de31cdeee105c3dae63daf7c6b22da9f3bf01490b326bc9f6b82368c6ad9c08eb142370d3dc1b426dca435b191030826e8f771d3be3ba7dc4c0b7cc4d49b66f09112ab6bc5da5fb8849a53e73dfb8efa6d68da23d517d1c88625c737c18835dc0c13e068856e3365b21fff44a7e5ba0028790ed1d6d79afcd26b7d50815195582537167a09a145649789b3ce6be372d128e614520b1800e1efcb01586bba4950bbf1741bc8789c0c3f14d1ce587c8988135103d2caa12c766f87b80cf658668b71e219256f801eeec21720d4a3da9440752011dc3f17b2269fa1f6eb1ec52ba80b955a819044c5e0e1a5e9e298bf3cb419bf1af073f23f9e1b0d0a3af00309bea7e31a8c00bc2a71e2b454439a3972586e3e5bfb7c424c3692d0b22c3a4c4247346fc0e62396d41667649e08ab54e8558613aa48d95473c4efa6b8636a992c14324175290cec1672e6492f37fb2a5ef23fa824872c6670276c2cef6b37dd6a20e63501afa84392fdd416c83362f4ba25aedc39543d1804094cea603f341fc648b27dcdd38f4af8e61314d58625b700ab81929f3264709c275400a6ec630588e8a6356f93709eb3121724a09dcdea32b29fed018c038b206fd84c08fc1bc76ab5f13d1ddfc05700b2c956b85877c670462c744c17bd299f98695a20e35b0c3a4fbbd829e822b9ae499e74ec012bbc78f538061aeaf57ad6c4786d89440b37df34b34a799249a32d5a51e556293e14493056bad25077e9b115e3f0db27839815c0e8ff96263432f97c466ff3a7d79eb20ffa537138309ea8a9b7cfb7b8a637782d0e2d80212b33c5694d6d2901d338a75cad6923107bb9e6e154769196ad9c903d230c96058def4056641ba85b8e117da611fbc5b4d664e3fd7f0ba3320c23836c67e5ea7715f13ee1ae829cf1423c45af3f24518b0e372645f190d8aa228ca791bd2cfe640cc42820c1a8e8e3e8f100f550805844aa41673937df5b612502c63ec67f5687fb37f0d28ed790b0e2d6c8932eff0ef4b65b53d21d46a63aa90d1e967d42ef56b9028d37221c288cc6cdde6236d02b3401229a9d149fcd58bb740d33e6ac22e362918616d9493be2c095c0f386b71c433476199de10af14c82a4a0bb1270df41d095d7742c04c47e0218d98ae1fadcd63ee759981e3d5a126d0246bda554d5017df57e894ea1b15078e3eb91ed291df3136ad2e07758a81a05dcf74e3fc7f523cda62ac995a9b92bd020f5fe7b7f081347da26d3271747e3a8d158b116d1e1e94baa7b4a611e134f86f5780a7f122ec4cb88b52e8866e5078b6e5077f0b54d5e7825a90c8f20c7d4d4807ee73ae1b42aca7cec944db11320c15212e62b522f01883c3f3b50ff12be56e027751bffd493a0ff413dbcef17c5cfa81f7a11fcd39e3eae4167e6f3ccccf1aab8a0281c7454c6552ae238c8098b914fb68498a5649bd3b434b2c1b53c9a43ee26ad21e838266e83005f63e14657aa2b4ab130a496dc9a3428e3f499626912f2ebcc305f889c6a702e40ce4de71f8b3c6794620ae2fe8fed30f80c0a3e85cee5f77fc4c03eca7b53baf6f6d8e5bd8758189fdb66bc679741c524c6cd82e72f4f0d4d0812176c0d7ebb0db971d13dc4e5e1ddfd12a63d4641566d421abe1e815ae15305870a1187f353331919d7ba86ff228738ff3359f890f2039cb268b93f32cbfee114c6c9175f06fe8220b7757165bda2f4d1e7421a0bd351b0f50da2323ef823e1f10605666b39bf46f4321fe1da4c8f5a0576ea84dee1efbf58e1590115575f9e6288e1d564f432f7bf9def58993c76cd27808118ef76ec8a20acf17d91440705f0ea0fdc3aee6c911d16629c0a2cec2d7770335e5e568f37f492282e72bf79b13f984c38ee0746299ad30c763188680f1fb5419ff8a7505df6d9aeed6a9f9d658e3fe4212a8a4597da63fafadc19de2be7a3a15b0269934032bba552474b9e57f8a9f0ddb0dea62eb71a048bcf0a20bee753e802e4f3e8127ef0d4559d6fc2d8d9e8e424a0d974ab9d2c2b21c81886a7da888707067da2d4cb694f9d729110b056f347c4ca71695b44cc6d9637800ac6d738947042289ca83c4c879566633821fce42f1c41dffa68f7d9", &(0x7f0000001000)=""/138, 0x4}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001340)={&(0x7f0000001100)="155ae4cca188ca41723a0d6956a45f6cc8528d4815ecc000067f718352be93726fd680775882524bfd0483c49d9d406d449078705935f2724b1c753f6ca4dc6c43c47f48eb010b10339f9b137e4eb961d04eedd07684ddd6fb7955ed3af666c5b72fd2b18583737c97c9dae01967826bfda4ef3742c929129856dd4cfad374a6e920893bc7640d12255c61cc75868a65d19df97b42eed544250693d24091212cf7769c3a804683be583125c135f99e7c10bc32d2ccbbd878d1", &(0x7f00000011c0)=""/230, &(0x7f00000012c0)="fb111947dc47e6a404dbc1fc737bb989f1a8b5126d766dbd8a8889ef3736de2bfbbca3", &(0x7f0000001300)="dd4445132b4fe20e797a106c7644614ac73a2b7073ae221527165a0f", 0x6, r0, 0x4}, 0x38) 07:33:04 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x101100, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3622}, [@alu={0x4, 0x1, 0x5, 0x3, 0x1, 0xffffffffffffffe0, 0x4}, @generic={0x5, 0x0, 0x6, 0x4, 0x6}, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x1, 0xd, 0xb, 0x3, 0x80, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x2, 0x5, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000500)='syzkaller\x00', 0xffffffff, 0x91, &(0x7f0000000540)=""/145, 0x1f00, 0x11, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xf, 0xb0}, 0x10, 0xd2a5, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[r0, r0]}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendto(r2, &(0x7f0000000180)="1597edc4a69b0938ad902a821f619fadce18ed09bd04a40a89e2891c264182a7e4748edfd373cf09eb74bd920cbf986c195e5b0edfaaa110db3236be909b6e25f4ce654838f019405b826607fea59351ec5f8b80337b49b53846cd612157a6391f996bfaf16259de5f6646dd07b88fc568d39c3db47f20c492236b30311eda8e02d1e530de98c0a5cf1c76a22f00ce0cdd56a9b2a0092468db585f477cdc777a5fab7f", 0xa3, 0x20000001, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x3, {0xa, 0x4e23, 0x7, @mcast2, 0xc51}}}, 0x38) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25090000faffffff000100000005003000000000de07000000020000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r3, 0x8, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xe619}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x88}, 0x884) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x101100, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3622}, [@alu={0x4, 0x1, 0x5, 0x3, 0x1, 0xffffffffffffffe0, 0x4}, @generic={0x5, 0x0, 0x6, 0x4, 0x6}, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x1, 0xd, 0xb, 0x3, 0x80, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x2, 0x5, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000500)='syzkaller\x00', 0xffffffff, 0x91, &(0x7f0000000540)=""/145, 0x1f00, 0x11, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xf, 0xb0}, 0x10, 0xd2a5, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[r0, r0]}, 0x80) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) sendto(r2, &(0x7f0000000180)="1597edc4a69b0938ad902a821f619fadce18ed09bd04a40a89e2891c264182a7e4748edfd373cf09eb74bd920cbf986c195e5b0edfaaa110db3236be909b6e25f4ce654838f019405b826607fea59351ec5f8b80337b49b53846cd612157a6391f996bfaf16259de5f6646dd07b88fc568d39c3db47f20c492236b30311eda8e02d1e530de98c0a5cf1c76a22f00ce0cdd56a9b2a0092468db585f477cdc777a5fab7f", 0xa3, 0x20000001, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x3, {0xa, 0x4e23, 0x7, @mcast2, 0xc51}}}, 0x38) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25090000faffffff000100000005003000000000de07000000020000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2) (async) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r3, 0x8, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xe619}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x88}, 0x884) (async) 07:33:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x2, 0x401, "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", 0x0, 0x4, 0x5, 0x0, 0x9}, r5}}, 0x120) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x4, 0x9, "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", 0x0, 0x6, 0x40, 0x80, 0x8, 0x2}}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:04 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000000)="591ebcb26da28e2cfc6f72cd5719fd3e6e4260dae73b49cf1068a57fee492f00fe5513416277dc8256dcd6d704678d94bf1365b0589ecf1a906c68ca77c647f961cf0eb09a21c28a3afcab6d1a39f1056ed1adec6070efb9c9e7a056630d1a4d08e5827edbea1435b72a1905773eef94cd86ee8c189b95127ed57fd904aaf424ed659de53a52a0f4adec691ca9d82a680f6e1ce1252b9d57a772e7e8e6f60dbe18d647d7e73e44dea8e275e8fcd7866b1da6b895d6c6696a79c5715d27fabc930edf7dc958bd22c2e6adddeea805ff25d753c6ed15cb54f58d08a694b5b6ad3b8984209cb2865835a12835332954fec14254a7ed51b1c858985eb27eedf1686629fd1df6f8a57e5dc900d1139562d62d134761f5244a41bf63ea23769d2ef0787735a33159e1f13f3eabece2c0d5f2fc43f6ae4cfe539b871aaef90cc9d2b287c060cfe0af61f39574d59622d2c2ec91f585cdf98c71c6d15448a1740491785e9a43b0e56fb42e212f24a6490d396d1e265f12eca82eba54db4b3e2676d94f857fdd3c1f2ea22fe460fea8c409415a76472ced13454524dbf7722d87fd526efb4ef30b65c9c7a862254d1c59f98ec5503b73f3fa02e01309ddb7e602a0c521f80f8c68062c71ec03b80217e4ccf4218c2ba21bfb31888197276dd72e4003ef793ddc92c2ef894e7e1a77e6433da28aa7e16ec65e8cd9748d614054ddcfb3e0111d29ef9d52079a6c55e1e739909ad3ff7057ebaa55a83421e68ce46a7f8b0d9679f95440dc866b7ee3850023b7f1a880c36c720c963cddd4f17545c1b06e6eabd258eb1fb850e4735427126ac619b2290ace5f1fcb1a1e8cf3587021b05d1546afb1383b9c1b9dc341c615f88e01d0e7a1fb1d9721b8843f89d5a494933c396c7439a0756484b01131b123428e036d0e99e48e95bdfdbcbf50c8c9208b503abb4555dd883408d05fd8a2df47c1ee57ddccfbe06bd6b981714ac5a3806613dcce36bdf1cfe41616ca34f6bc5e419059ee7efe1980a2c1846ad838dc1c8ec1190ff1c987554dd27c2f84918981066a6cfee75abeb8ed8de1f5f0025fcc394b60a27e2845ad9cd1b81c6fd72850b5551ffeb8d5bec563bc721331c63f0e334c2ee1dfed204467786b1acfc47a8d6f7fb0e4ea3fe6690b317bf9868919b5d9642d3105e4092492ef727ffc26a86e15af30b0ff79463dd181a97dd206a6005b2f80db2727c458c54978e88dc46b0683868b298d11a75c85dddb01ad643db3277f7a481d452d777913f8c3ea75b7646a85397d6223869fc9ff0ccabf2abded15418a2d6e68c43df7b0933194e7eb9be378e12f41134f6af9fbda25a77917e4d9394df2217ce14f1f04dab096f00eb1b9d332022d49aa9afe9f6af115721d32389015d9ccbb1d4722d1a6e46881fde65de838603cdfddcd9b72ad74a1b11887d37565baf1f2bf877f95f006430c5b585aff9c9b167122478eafda95d356dac915d64e2e8a20dcea364fbf2b1648aa0b0355d95983fae852cce80f9388a7f2bb905ef8eec07c01d6f359b096716dcc5757630b0e9fcb4295fe077cd3bf51047822f6c04dd9ee1698456bedfe5eb940369a2f2ef03312d11901f96b5e75722eeb91901c0422e15184e3f15cbe86ae87f4a5cfff3db58f51c3b456e7ea38303768d3d8300bd64e423ef0ae7360f2d2958406c76b95fcce889058163d868a05099bf9f9be91e1794eeb8697bf1bebbd71a6e6aa21eeee3f140308a44463863a84a1edf33fa63ccebe0f1eaeb19ca239b5ab36a59eaebd5a50da45df91f7ad31a2883698a47eb61a6812d66cd1861781f9d9762b5232b6d15d954001073acbe68cc16c37cdd2590741075ea47a0f8b90b51b596fc5cc2ca4a07facbab99863f36539cc1c65ca230b503624491893241228f825fd5de0487f34ef64d54fa098d03906a2b7068936e579df66b724ecabe8a1bace41f4782397b47a55b77f1ec59ec87382c9110ede545638926c143a23f0ff9e6b42750644084b5cb55eeae348a0636159d2000521beb4e4b226d6e411e19f4d17048930851c8c14c09a2b456799d3f1b387a392bdc1264dd9d0ffcb4bf60b8d2285224ba289d6d3c961986c802971992560f23e331cb68d1600672ed93d9eef272770a2cac26d880e2a7970c66026caedc1d30d178297488bd81125de98cd860018c8e6910585620eb09179002f65d213c31e73af97217d9a1ab29e2bda9846959e39fa1c03a13fa6c9969081a9c3edab6e49918849ebc251529e221a60d9c222057ca1aa00d9eca8d2bdba453c99fc6d8bb74ed20806b48554db92adf32894053e521cfb592d078e414cf84385b1b7901c707f980082eaca15e3966770a9cbc85b239509c6a72221a1009ce115ab90fd6430368345df3fb665f45b5015f7bbc564e1a0d16454b3eb2ffa9535155ac143d851631f9cb5d27fad998affa7cf6e20e277d6a58edb2846452f743d7ae29d1d3f8a452df30db9c425201f1a081d1668259ea7ce85df6be4feeba05f10a672c7583346f10c015e36828a6c435be52d915856cfdc9f12f05ec85f9b2ae834c67fbeaaa960dff10bf9cdcc7d3672d64c7c34b10db2c39a2921de7e38d8af7c8639d54575c9db12c0ee576539c93754f9934a1d06ecd82430a2e2494b54bce8105ac68333bc1213af587a59d53b3e161028c0bd6d20309e47b68c8fa7793ab595cbd311ab243c608bab0950d888f8a00a2756e99c23397f2ea584ad4689cca976e72d2646a059fdcb6c3a3524af0a0ed18d5a4478b5b834431406068c2c891c9a72cbee18864a43bb6a101ca57dd6cf2903385075fad3160a89ffcc5e28c71a513732f0552afcc76d945b7f52653c184de09346ce4e7950c317af0869bf7e6976e9692bbf6683699291bae2fc82fe5dbd765188b9627e20c1f861c8f105164d98b435eb139003ececc05d93aa913675564ba20a4c3236b3bb6d923a4ca6a70bfbac6f73e5296951b12a880d5775779fa3ada9770f38366321eb67c82c99ef0142ba665834898420af09b30728e42143e92822ad143941742160eaf35904a11029d346336c0541ae3862682aba8111804a3405ce2dafc67b07554299d2814be64c7970e871e60ffbd08044a6c8a6638fcb7c64cfd1477a45a59e29f57b6149077b5c44a91781bc6dba98f099b480551d21d8c5e8ea71b352d2fdb7085f2a2e8e604673b8e9757cbee01f6c9534cfd293e3ad5ac7f91cd11fe90f94f7616811cc16b110c9ca142db907290c0b587eb7392edbca09fc24ba3655c28b4f1712dcc0a195c7b4a8551850a06f92ebc899d4846d7a2c0b90a26c2b3331f0d1d02573d49396d5e7384040f077e08db15454c4be73214b16416a09d535af15296d671ce966fbe1f0691c399599a476d40c887e1d939a113634d49c747f78684e321018e7c2a7d2cc0df42a4d6eee2c6829cbdbed8d5e8553e630a06bcf17e0a0036afd98ba1f797b9708c287695fba7b6309d6457a969677d44a0a3f9db3c990fa858f73e992ff988ce45b299e1ff8ff30b977592f3b1ab2ca481f032346279813ee36eae9f4ea710d27d23ffedb4d909158cb39b6b73010dc22f4ab6465cdb31e0178497b11d4a16852199d8b2444b9a76c76e25971f6897e834970cd0d2f9937e29a52acfacae290476775a165de31cdeee105c3dae63daf7c6b22da9f3bf01490b326bc9f6b82368c6ad9c08eb142370d3dc1b426dca435b191030826e8f771d3be3ba7dc4c0b7cc4d49b66f09112ab6bc5da5fb8849a53e73dfb8efa6d68da23d517d1c88625c737c18835dc0c13e068856e3365b21fff44a7e5ba0028790ed1d6d79afcd26b7d50815195582537167a09a145649789b3ce6be372d128e614520b1800e1efcb01586bba4950bbf1741bc8789c0c3f14d1ce587c8988135103d2caa12c766f87b80cf658668b71e219256f801eeec21720d4a3da9440752011dc3f17b2269fa1f6eb1ec52ba80b955a819044c5e0e1a5e9e298bf3cb419bf1af073f23f9e1b0d0a3af00309bea7e31a8c00bc2a71e2b454439a3972586e3e5bfb7c424c3692d0b22c3a4c4247346fc0e62396d41667649e08ab54e8558613aa48d95473c4efa6b8636a992c14324175290cec1672e6492f37fb2a5ef23fa824872c6670276c2cef6b37dd6a20e63501afa84392fdd416c83362f4ba25aedc39543d1804094cea603f341fc648b27dcdd38f4af8e61314d58625b700ab81929f3264709c275400a6ec630588e8a6356f93709eb3121724a09dcdea32b29fed018c038b206fd84c08fc1bc76ab5f13d1ddfc05700b2c956b85877c670462c744c17bd299f98695a20e35b0c3a4fbbd829e822b9ae499e74ec012bbc78f538061aeaf57ad6c4786d89440b37df34b34a799249a32d5a51e556293e14493056bad25077e9b115e3f0db27839815c0e8ff96263432f97c466ff3a7d79eb20ffa537138309ea8a9b7cfb7b8a637782d0e2d80212b33c5694d6d2901d338a75cad6923107bb9e6e154769196ad9c903d230c96058def4056641ba85b8e117da611fbc5b4d664e3fd7f0ba3320c23836c67e5ea7715f13ee1ae829cf1423c45af3f24518b0e372645f190d8aa228ca791bd2cfe640cc42820c1a8e8e3e8f100f550805844aa41673937df5b612502c63ec67f5687fb37f0d28ed790b0e2d6c8932eff0ef4b65b53d21d46a63aa90d1e967d42ef56b9028d37221c288cc6cdde6236d02b3401229a9d149fcd58bb740d33e6ac22e362918616d9493be2c095c0f386b71c433476199de10af14c82a4a0bb1270df41d095d7742c04c47e0218d98ae1fadcd63ee759981e3d5a126d0246bda554d5017df57e894ea1b15078e3eb91ed291df3136ad2e07758a81a05dcf74e3fc7f523cda62ac995a9b92bd020f5fe7b7f081347da26d3271747e3a8d158b116d1e1e94baa7b4a611e134f86f5780a7f122ec4cb88b52e8866e5078b6e5077f0b54d5e7825a90c8f20c7d4d4807ee73ae1b42aca7cec944db11320c15212e62b522f01883c3f3b50ff12be56e027751bffd493a0ff413dbcef17c5cfa81f7a11fcd39e3eae4167e6f3ccccf1aab8a0281c7454c6552ae238c8098b914fb68498a5649bd3b434b2c1b53c9a43ee26ad21e838266e83005f63e14657aa2b4ab130a496dc9a3428e3f499626912f2ebcc305f889c6a702e40ce4de71f8b3c6794620ae2fe8fed30f80c0a3e85cee5f77fc4c03eca7b53baf6f6d8e5bd8758189fdb66bc679741c524c6cd82e72f4f0d4d0812176c0d7ebb0db971d13dc4e5e1ddfd12a63d4641566d421abe1e815ae15305870a1187f353331919d7ba86ff228738ff3359f890f2039cb268b93f32cbfee114c6c9175f06fe8220b7757165bda2f4d1e7421a0bd351b0f50da2323ef823e1f10605666b39bf46f4321fe1da4c8f5a0576ea84dee1efbf58e1590115575f9e6288e1d564f432f7bf9def58993c76cd27808118ef76ec8a20acf17d91440705f0ea0fdc3aee6c911d16629c0a2cec2d7770335e5e568f37f492282e72bf79b13f984c38ee0746299ad30c763188680f1fb5419ff8a7505df6d9aeed6a9f9d658e3fe4212a8a4597da63fafadc19de2be7a3a15b0269934032bba552474b9e57f8a9f0ddb0dea62eb71a048bcf0a20bee753e802e4f3e8127ef0d4559d6fc2d8d9e8e424a0d974ab9d2c2b21c81886a7da888707067da2d4cb694f9d729110b056f347c4ca71695b44cc6d9637800ac6d738947042289ca83c4c879566633821fce42f1c41dffa68f7d9", &(0x7f0000001000)=""/138, 0x4}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001340)={&(0x7f0000001100)="155ae4cca188ca41723a0d6956a45f6cc8528d4815ecc000067f718352be93726fd680775882524bfd0483c49d9d406d449078705935f2724b1c753f6ca4dc6c43c47f48eb010b10339f9b137e4eb961d04eedd07684ddd6fb7955ed3af666c5b72fd2b18583737c97c9dae01967826bfda4ef3742c929129856dd4cfad374a6e920893bc7640d12255c61cc75868a65d19df97b42eed544250693d24091212cf7769c3a804683be583125c135f99e7c10bc32d2ccbbd878d1", &(0x7f00000011c0)=""/230, &(0x7f00000012c0)="fb111947dc47e6a404dbc1fc737bb989f1a8b5126d766dbd8a8889ef3736de2bfbbca3", &(0x7f0000001300)="dd4445132b4fe20e797a106c7644614ac73a2b7073ae221527165a0f", 0x6, r0, 0x4}, 0x38) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000000)="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", &(0x7f0000001000)=""/138, 0x4}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001340)={&(0x7f0000001100)="155ae4cca188ca41723a0d6956a45f6cc8528d4815ecc000067f718352be93726fd680775882524bfd0483c49d9d406d449078705935f2724b1c753f6ca4dc6c43c47f48eb010b10339f9b137e4eb961d04eedd07684ddd6fb7955ed3af666c5b72fd2b18583737c97c9dae01967826bfda4ef3742c929129856dd4cfad374a6e920893bc7640d12255c61cc75868a65d19df97b42eed544250693d24091212cf7769c3a804683be583125c135f99e7c10bc32d2ccbbd878d1", &(0x7f00000011c0)=""/230, &(0x7f00000012c0)="fb111947dc47e6a404dbc1fc737bb989f1a8b5126d766dbd8a8889ef3736de2bfbbca3", &(0x7f0000001300)="dd4445132b4fe20e797a106c7644614ac73a2b7073ae221527165a0f", 0x6, r0, 0x4}, 0x38) (async) 07:33:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x0, 0x4, 0x490}}) 07:33:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040000) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040000) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x88, 0x22, 0x0, 0x0) (async) 07:33:04 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x101100, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3622}, [@alu={0x4, 0x1, 0x5, 0x3, 0x1, 0xffffffffffffffe0, 0x4}, @generic={0x5, 0x0, 0x6, 0x4, 0x6}, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x1, 0xd, 0xb, 0x3, 0x80, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x2, 0x5, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000500)='syzkaller\x00', 0xffffffff, 0x91, &(0x7f0000000540)=""/145, 0x1f00, 0x11, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xf, 0xb0}, 0x10, 0xd2a5, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[r0, r0]}, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) sendto(r2, &(0x7f0000000180)="1597edc4a69b0938ad902a821f619fadce18ed09bd04a40a89e2891c264182a7e4748edfd373cf09eb74bd920cbf986c195e5b0edfaaa110db3236be909b6e25f4ce654838f019405b826607fea59351ec5f8b80337b49b53846cd612157a6391f996bfaf16259de5f6646dd07b88fc568d39c3db47f20c492236b30311eda8e02d1e530de98c0a5cf1c76a22f00ce0cdd56a9b2a0092468db585f477cdc777a5fab7f", 0xa3, 0x20000001, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x3, {0xa, 0x4e23, 0x7, @mcast2, 0xc51}}}, 0x38) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25090000faffffff000100000005003000000000de07000000020000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) (async, rerun: 64) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r2) (rerun: 64) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r3, 0x8, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xe619}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x88}, 0x884) 07:33:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x2, 0x401, "206fa5c5b744496be694bc931c27dfc47a22c4ea7e5915cca358860f5f22a89ae7bd1c80e78c301474dd194ad9fe283060fccfc965d3d569a9ea5ce42e35ab8508eead73d148c03236b84d4f4f98afa2ee7cacd8d025a10a1e07ef40384108fdf8f77c3af6c77e9b221e036ce9faffd0be352c21ea66b1a239d7e177bc0cd3746de818e03081d1f97bc5587f75cb649f2369e42d48f2c8a6e43435fb1e641439bae2b46d8045b69fe5c31fe770f992f02587a44d9b3bd0d48b36ad6976b22996a0946b8cd45d55f64a9c1991ef9bb50034ac14c77ff0ce3bcae1981832131bd6335ec5c6fd3eff23d078ab1287d70155afb2d9083666dca62333321825fe8619", 0x0, 0x4, 0x5, 0x0, 0x9}, r5}}, 0x120) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x4, 0x9, "4bc4be8d45714e5b072f67b441e3a14140982cb00da5883e0a375c915f1c8a50efe1239bd4fc94a611949df3471d57f08c7e1f133a5efccac06ac0c90734afe2fd535f16071ab813196f817e9bd06bfd42b367caeb0490ebd30b9049212875269981daf4fc6b21c98b2c6997c41023fca1101750c6eac6bd6e7aba5b1505a00089d83e4e3b39ea6c2e49e9b236a928dcdab84390b4d0e130c857fd81234b26d9073be412088d615c6156ba2d310c4727677b201caa798275f4268753bd2ea61387dc0fa50b9fc100731a7054b8ff9ed8e53722fca4c79179e7cf514ac601fa0cd122c2679149c1c9a272561dd0652762c86e4b985367b15550629908a93d6873", 0x0, 0x6, 0x40, 0x80, 0x8, 0x2}}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:04 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000000)="591ebcb26da28e2cfc6f72cd5719fd3e6e4260dae73b49cf1068a57fee492f00fe5513416277dc8256dcd6d704678d94bf1365b0589ecf1a906c68ca77c647f961cf0eb09a21c28a3afcab6d1a39f1056ed1adec6070efb9c9e7a056630d1a4d08e5827edbea1435b72a1905773eef94cd86ee8c189b95127ed57fd904aaf424ed659de53a52a0f4adec691ca9d82a680f6e1ce1252b9d57a772e7e8e6f60dbe18d647d7e73e44dea8e275e8fcd7866b1da6b895d6c6696a79c5715d27fabc930edf7dc958bd22c2e6adddeea805ff25d753c6ed15cb54f58d08a694b5b6ad3b8984209cb2865835a12835332954fec14254a7ed51b1c858985eb27eedf1686629fd1df6f8a57e5dc900d1139562d62d134761f5244a41bf63ea23769d2ef0787735a33159e1f13f3eabece2c0d5f2fc43f6ae4cfe539b871aaef90cc9d2b287c060cfe0af61f39574d59622d2c2ec91f585cdf98c71c6d15448a1740491785e9a43b0e56fb42e212f24a6490d396d1e265f12eca82eba54db4b3e2676d94f857fdd3c1f2ea22fe460fea8c409415a76472ced13454524dbf7722d87fd526efb4ef30b65c9c7a862254d1c59f98ec5503b73f3fa02e01309ddb7e602a0c521f80f8c68062c71ec03b80217e4ccf4218c2ba21bfb31888197276dd72e4003ef793ddc92c2ef894e7e1a77e6433da28aa7e16ec65e8cd9748d614054ddcfb3e0111d29ef9d52079a6c55e1e739909ad3ff7057ebaa55a83421e68ce46a7f8b0d9679f95440dc866b7ee3850023b7f1a880c36c720c963cddd4f17545c1b06e6eabd258eb1fb850e4735427126ac619b2290ace5f1fcb1a1e8cf3587021b05d1546afb1383b9c1b9dc341c615f88e01d0e7a1fb1d9721b8843f89d5a494933c396c7439a0756484b01131b123428e036d0e99e48e95bdfdbcbf50c8c9208b503abb4555dd883408d05fd8a2df47c1ee57ddccfbe06bd6b981714ac5a3806613dcce36bdf1cfe41616ca34f6bc5e419059ee7efe1980a2c1846ad838dc1c8ec1190ff1c987554dd27c2f84918981066a6cfee75abeb8ed8de1f5f0025fcc394b60a27e2845ad9cd1b81c6fd72850b5551ffeb8d5bec563bc721331c63f0e334c2ee1dfed204467786b1acfc47a8d6f7fb0e4ea3fe6690b317bf9868919b5d9642d3105e4092492ef727ffc26a86e15af30b0ff79463dd181a97dd206a6005b2f80db2727c458c54978e88dc46b0683868b298d11a75c85dddb01ad643db3277f7a481d452d777913f8c3ea75b7646a85397d6223869fc9ff0ccabf2abded15418a2d6e68c43df7b0933194e7eb9be378e12f41134f6af9fbda25a77917e4d9394df2217ce14f1f04dab096f00eb1b9d332022d49aa9afe9f6af115721d32389015d9ccbb1d4722d1a6e46881fde65de838603cdfddcd9b72ad74a1b11887d37565baf1f2bf877f95f006430c5b585aff9c9b167122478eafda95d356dac915d64e2e8a20dcea364fbf2b1648aa0b0355d95983fae852cce80f9388a7f2bb905ef8eec07c01d6f359b096716dcc5757630b0e9fcb4295fe077cd3bf51047822f6c04dd9ee1698456bedfe5eb940369a2f2ef03312d11901f96b5e75722eeb91901c0422e15184e3f15cbe86ae87f4a5cfff3db58f51c3b456e7ea38303768d3d8300bd64e423ef0ae7360f2d2958406c76b95fcce889058163d868a05099bf9f9be91e1794eeb8697bf1bebbd71a6e6aa21eeee3f140308a44463863a84a1edf33fa63ccebe0f1eaeb19ca239b5ab36a59eaebd5a50da45df91f7ad31a2883698a47eb61a6812d66cd1861781f9d9762b5232b6d15d954001073acbe68cc16c37cdd2590741075ea47a0f8b90b51b596fc5cc2ca4a07facbab99863f36539cc1c65ca230b503624491893241228f825fd5de0487f34ef64d54fa098d03906a2b7068936e579df66b724ecabe8a1bace41f4782397b47a55b77f1ec59ec87382c9110ede545638926c143a23f0ff9e6b42750644084b5cb55eeae348a0636159d2000521beb4e4b226d6e411e19f4d17048930851c8c14c09a2b456799d3f1b387a392bdc1264dd9d0ffcb4bf60b8d2285224ba289d6d3c961986c802971992560f23e331cb68d1600672ed93d9eef272770a2cac26d880e2a7970c66026caedc1d30d178297488bd81125de98cd860018c8e6910585620eb09179002f65d213c31e73af97217d9a1ab29e2bda9846959e39fa1c03a13fa6c9969081a9c3edab6e49918849ebc251529e221a60d9c222057ca1aa00d9eca8d2bdba453c99fc6d8bb74ed20806b48554db92adf32894053e521cfb592d078e414cf84385b1b7901c707f980082eaca15e3966770a9cbc85b239509c6a72221a1009ce115ab90fd6430368345df3fb665f45b5015f7bbc564e1a0d16454b3eb2ffa9535155ac143d851631f9cb5d27fad998affa7cf6e20e277d6a58edb2846452f743d7ae29d1d3f8a452df30db9c425201f1a081d1668259ea7ce85df6be4feeba05f10a672c7583346f10c015e36828a6c435be52d915856cfdc9f12f05ec85f9b2ae834c67fbeaaa960dff10bf9cdcc7d3672d64c7c34b10db2c39a2921de7e38d8af7c8639d54575c9db12c0ee576539c93754f9934a1d06ecd82430a2e2494b54bce8105ac68333bc1213af587a59d53b3e161028c0bd6d20309e47b68c8fa7793ab595cbd311ab243c608bab0950d888f8a00a2756e99c23397f2ea584ad4689cca976e72d2646a059fdcb6c3a3524af0a0ed18d5a4478b5b834431406068c2c891c9a72cbee18864a43bb6a101ca57dd6cf2903385075fad3160a89ffcc5e28c71a513732f0552afcc76d945b7f52653c184de09346ce4e7950c317af0869bf7e6976e9692bbf6683699291bae2fc82fe5dbd765188b9627e20c1f861c8f105164d98b435eb139003ececc05d93aa913675564ba20a4c3236b3bb6d923a4ca6a70bfbac6f73e5296951b12a880d5775779fa3ada9770f38366321eb67c82c99ef0142ba665834898420af09b30728e42143e92822ad143941742160eaf35904a11029d346336c0541ae3862682aba8111804a3405ce2dafc67b07554299d2814be64c7970e871e60ffbd08044a6c8a6638fcb7c64cfd1477a45a59e29f57b6149077b5c44a91781bc6dba98f099b480551d21d8c5e8ea71b352d2fdb7085f2a2e8e604673b8e9757cbee01f6c9534cfd293e3ad5ac7f91cd11fe90f94f7616811cc16b110c9ca142db907290c0b587eb7392edbca09fc24ba3655c28b4f1712dcc0a195c7b4a8551850a06f92ebc899d4846d7a2c0b90a26c2b3331f0d1d02573d49396d5e7384040f077e08db15454c4be73214b16416a09d535af15296d671ce966fbe1f0691c399599a476d40c887e1d939a113634d49c747f78684e321018e7c2a7d2cc0df42a4d6eee2c6829cbdbed8d5e8553e630a06bcf17e0a0036afd98ba1f797b9708c287695fba7b6309d6457a969677d44a0a3f9db3c990fa858f73e992ff988ce45b299e1ff8ff30b977592f3b1ab2ca481f032346279813ee36eae9f4ea710d27d23ffedb4d909158cb39b6b73010dc22f4ab6465cdb31e0178497b11d4a16852199d8b2444b9a76c76e25971f6897e834970cd0d2f9937e29a52acfacae290476775a165de31cdeee105c3dae63daf7c6b22da9f3bf01490b326bc9f6b82368c6ad9c08eb142370d3dc1b426dca435b191030826e8f771d3be3ba7dc4c0b7cc4d49b66f09112ab6bc5da5fb8849a53e73dfb8efa6d68da23d517d1c88625c737c18835dc0c13e068856e3365b21fff44a7e5ba0028790ed1d6d79afcd26b7d50815195582537167a09a145649789b3ce6be372d128e614520b1800e1efcb01586bba4950bbf1741bc8789c0c3f14d1ce587c8988135103d2caa12c766f87b80cf658668b71e219256f801eeec21720d4a3da9440752011dc3f17b2269fa1f6eb1ec52ba80b955a819044c5e0e1a5e9e298bf3cb419bf1af073f23f9e1b0d0a3af00309bea7e31a8c00bc2a71e2b454439a3972586e3e5bfb7c424c3692d0b22c3a4c4247346fc0e62396d41667649e08ab54e8558613aa48d95473c4efa6b8636a992c14324175290cec1672e6492f37fb2a5ef23fa824872c6670276c2cef6b37dd6a20e63501afa84392fdd416c83362f4ba25aedc39543d1804094cea603f341fc648b27dcdd38f4af8e61314d58625b700ab81929f3264709c275400a6ec630588e8a6356f93709eb3121724a09dcdea32b29fed018c038b206fd84c08fc1bc76ab5f13d1ddfc05700b2c956b85877c670462c744c17bd299f98695a20e35b0c3a4fbbd829e822b9ae499e74ec012bbc78f538061aeaf57ad6c4786d89440b37df34b34a799249a32d5a51e556293e14493056bad25077e9b115e3f0db27839815c0e8ff96263432f97c466ff3a7d79eb20ffa537138309ea8a9b7cfb7b8a637782d0e2d80212b33c5694d6d2901d338a75cad6923107bb9e6e154769196ad9c903d230c96058def4056641ba85b8e117da611fbc5b4d664e3fd7f0ba3320c23836c67e5ea7715f13ee1ae829cf1423c45af3f24518b0e372645f190d8aa228ca791bd2cfe640cc42820c1a8e8e3e8f100f550805844aa41673937df5b612502c63ec67f5687fb37f0d28ed790b0e2d6c8932eff0ef4b65b53d21d46a63aa90d1e967d42ef56b9028d37221c288cc6cdde6236d02b3401229a9d149fcd58bb740d33e6ac22e362918616d9493be2c095c0f386b71c433476199de10af14c82a4a0bb1270df41d095d7742c04c47e0218d98ae1fadcd63ee759981e3d5a126d0246bda554d5017df57e894ea1b15078e3eb91ed291df3136ad2e07758a81a05dcf74e3fc7f523cda62ac995a9b92bd020f5fe7b7f081347da26d3271747e3a8d158b116d1e1e94baa7b4a611e134f86f5780a7f122ec4cb88b52e8866e5078b6e5077f0b54d5e7825a90c8f20c7d4d4807ee73ae1b42aca7cec944db11320c15212e62b522f01883c3f3b50ff12be56e027751bffd493a0ff413dbcef17c5cfa81f7a11fcd39e3eae4167e6f3ccccf1aab8a0281c7454c6552ae238c8098b914fb68498a5649bd3b434b2c1b53c9a43ee26ad21e838266e83005f63e14657aa2b4ab130a496dc9a3428e3f499626912f2ebcc305f889c6a702e40ce4de71f8b3c6794620ae2fe8fed30f80c0a3e85cee5f77fc4c03eca7b53baf6f6d8e5bd8758189fdb66bc679741c524c6cd82e72f4f0d4d0812176c0d7ebb0db971d13dc4e5e1ddfd12a63d4641566d421abe1e815ae15305870a1187f353331919d7ba86ff228738ff3359f890f2039cb268b93f32cbfee114c6c9175f06fe8220b7757165bda2f4d1e7421a0bd351b0f50da2323ef823e1f10605666b39bf46f4321fe1da4c8f5a0576ea84dee1efbf58e1590115575f9e6288e1d564f432f7bf9def58993c76cd27808118ef76ec8a20acf17d91440705f0ea0fdc3aee6c911d16629c0a2cec2d7770335e5e568f37f492282e72bf79b13f984c38ee0746299ad30c763188680f1fb5419ff8a7505df6d9aeed6a9f9d658e3fe4212a8a4597da63fafadc19de2be7a3a15b0269934032bba552474b9e57f8a9f0ddb0dea62eb71a048bcf0a20bee753e802e4f3e8127ef0d4559d6fc2d8d9e8e424a0d974ab9d2c2b21c81886a7da888707067da2d4cb694f9d729110b056f347c4ca71695b44cc6d9637800ac6d738947042289ca83c4c879566633821fce42f1c41dffa68f7d9", &(0x7f0000001000)=""/138, 0x4}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001340)={&(0x7f0000001100)="155ae4cca188ca41723a0d6956a45f6cc8528d4815ecc000067f718352be93726fd680775882524bfd0483c49d9d406d449078705935f2724b1c753f6ca4dc6c43c47f48eb010b10339f9b137e4eb961d04eedd07684ddd6fb7955ed3af666c5b72fd2b18583737c97c9dae01967826bfda4ef3742c929129856dd4cfad374a6e920893bc7640d12255c61cc75868a65d19df97b42eed544250693d24091212cf7769c3a804683be583125c135f99e7c10bc32d2ccbbd878d1", &(0x7f00000011c0)=""/230, &(0x7f00000012c0)="fb111947dc47e6a404dbc1fc737bb989f1a8b5126d766dbd8a8889ef3736de2bfbbca3", &(0x7f0000001300)="dd4445132b4fe20e797a106c7644614ac73a2b7073ae221527165a0f", 0x6, r0, 0x4}, 0x38) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000000)="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", &(0x7f0000001000)=""/138, 0x4}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001340)={&(0x7f0000001100)="155ae4cca188ca41723a0d6956a45f6cc8528d4815ecc000067f718352be93726fd680775882524bfd0483c49d9d406d449078705935f2724b1c753f6ca4dc6c43c47f48eb010b10339f9b137e4eb961d04eedd07684ddd6fb7955ed3af666c5b72fd2b18583737c97c9dae01967826bfda4ef3742c929129856dd4cfad374a6e920893bc7640d12255c61cc75868a65d19df97b42eed544250693d24091212cf7769c3a804683be583125c135f99e7c10bc32d2ccbbd878d1", &(0x7f00000011c0)=""/230, &(0x7f00000012c0)="fb111947dc47e6a404dbc1fc737bb989f1a8b5126d766dbd8a8889ef3736de2bfbbca3", &(0x7f0000001300)="dd4445132b4fe20e797a106c7644614ac73a2b7073ae221527165a0f", 0x6, r0, 0x4}, 0x38) (async) 07:33:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="65c492a82501f610af22d46c450fbb5e42b2014fcd2270e3d207766660e0a5a5cb4e0676dfc7a2b9da813b695b2b1e46d1fad00ee254212f84795e3adffc1708ada06c5d6ec46aeb99c668be5150a0ec49f111bd458e8191c2b9404a70aedfcab7621d49e3f4071285a2c5fdea3e", &(0x7f0000000100)=""/227, &(0x7f0000000200)="dadc624a11732f78cda79767ea8cff074e1280b700b3e3b52f736ee9c56a297619352a5b9d8b57c4bb3db478d917478cfb6d8d7705f2f740fe6092d8217c62377413c570e972a33fcbf486c92e3083db8f9d9b29545911e68a3b33d2ede639eb3ad1e056f373056d3b60dcd61ee188f0f039d53463b8586afaaa95e3f143666642164f42f5b45da21619d1e732ea88e60aaa49005acf5c095bb8ebfd866978f4134b9e10a37229855a53b68315e415b365d9e93d33b7", &(0x7f0000000380)="b9f4bae414cc2402df658eb6e689c668dc0bf30c6894c6a77d88dc6f23c507b74abed3095652699b6277e65b9aeb1816051cfe4b1eb3fcadb81feb42558abe67b25f785a127c6968c345b40843c3ad0c8c62c3ac389d8cd234811b2309537c1b66cfc367b6cebff85835ba4c02179e754a6faa9bb073112ba99dc824b0603f37276662d53b6caf9fb236656483dc13117260294f30dcdc7fd9a09403a0a41fbb983a4418ce5a1b89166f0771d0b872d5f7d8cd642155a23f051dd2d7f51540c5dc147a19868b68763c71555c0b818e3a78d12201a33fc3cbec0efc2177c2cd09d21be3f7a96ee65b27bab198a0a3", 0x5, r2}, 0x38) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x3, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x84e41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="65c492a82501f610af22d46c450fbb5e42b2014fcd2270e3d207766660e0a5a5cb4e0676dfc7a2b9da813b695b2b1e46d1fad00ee254212f84795e3adffc1708ada06c5d6ec46aeb99c668be5150a0ec49f111bd458e8191c2b9404a70aedfcab7621d49e3f4071285a2c5fdea3e", &(0x7f0000000100)=""/227, &(0x7f0000000200)="dadc624a11732f78cda79767ea8cff074e1280b700b3e3b52f736ee9c56a297619352a5b9d8b57c4bb3db478d917478cfb6d8d7705f2f740fe6092d8217c62377413c570e972a33fcbf486c92e3083db8f9d9b29545911e68a3b33d2ede639eb3ad1e056f373056d3b60dcd61ee188f0f039d53463b8586afaaa95e3f143666642164f42f5b45da21619d1e732ea88e60aaa49005acf5c095bb8ebfd866978f4134b9e10a37229855a53b68315e415b365d9e93d33b7", &(0x7f0000000380)="b9f4bae414cc2402df658eb6e689c668dc0bf30c6894c6a77d88dc6f23c507b74abed3095652699b6277e65b9aeb1816051cfe4b1eb3fcadb81feb42558abe67b25f785a127c6968c345b40843c3ad0c8c62c3ac389d8cd234811b2309537c1b66cfc367b6cebff85835ba4c02179e754a6faa9bb073112ba99dc824b0603f37276662d53b6caf9fb236656483dc13117260294f30dcdc7fd9a09403a0a41fbb983a4418ce5a1b89166f0771d0b872d5f7d8cd642155a23f051dd2d7f51540c5dc147a19868b68763c71555c0b818e3a78d12201a33fc3cbec0efc2177c2cd09d21be3f7a96ee65b27bab198a0a3", 0x5, r2}, 0x38) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x3, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x84e41, 0x0) (async) 07:33:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x7800, 0x0, 0x490}}) 07:33:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x14) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:04 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000180000012bbd7000fedbdf251d01060008000e00", @ANYRES32=0xee01, @ANYBLOB="15000300020000a0060200003eaf86af8a0e15e401000000150004000200002002010000467a5833724af47a0400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="1500020002000000060000000990b1097c2fa67c06000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendto(r0, &(0x7f0000000080)="4f9703f7510afb4aecca77ebfb9800527c973b259c3dd9612fba71cc426c52f57915bfe02133640ed5336f06c20e7fcebc9b8debfacb2765f742f1dd09eb8cb4e31e348cea49607a19874b00ad50f59a2ab35fde1684e353955d72750f843a336a458b9c2bfcde1c8f5ceb5e4b40f6707da88cbab3cc90953dced38c570024b94bb815f69b3a4c94ca5678ab", 0x8c, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)) 07:33:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x0, 0x7800}}) 07:33:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x5}}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x13, 0x5, 0x3, 0x20, 0x67cf58001de2e6b2, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x81, 0x3, 0xffff, 0x200, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) bpf$MAP_CREATE(0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x80, 0x2, @vifc_lcl_ifindex, @local}, 0x10) 07:33:04 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000180000012bbd7000fedbdf251d01060008000e00", @ANYRES32=0xee01, @ANYBLOB="15000300020000a0060200003eaf86af8a0e15e401000000150004000200002002010000467a5833724af47a0400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="1500020002000000060000000990b1097c2fa67c06000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendto(r0, &(0x7f0000000080)="4f9703f7510afb4aecca77ebfb9800527c973b259c3dd9612fba71cc426c52f57915bfe02133640ed5336f06c20e7fcebc9b8debfacb2765f742f1dd09eb8cb4e31e348cea49607a19874b00ad50f59a2ab35fde1684e353955d72750f843a336a458b9c2bfcde1c8f5ceb5e4b40f6707da88cbab3cc90953dced38c570024b94bb815f69b3a4c94ca5678ab", 0x8c, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00'}) (async) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000180000012bbd7000fedbdf251d01060008000e00", @ANYRES32=0xee01, @ANYBLOB="15000300020000a0060200003eaf86af8a0e15e401000000150004000200002002010000467a5833724af47a0400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="1500020002000000060000000990b1097c2fa67c06000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x10) (async) sendto(r0, &(0x7f0000000080)="4f9703f7510afb4aecca77ebfb9800527c973b259c3dd9612fba71cc426c52f57915bfe02133640ed5336f06c20e7fcebc9b8debfacb2765f742f1dd09eb8cb4e31e348cea49607a19874b00ad50f59a2ab35fde1684e353955d72750f843a336a458b9c2bfcde1c8f5ceb5e4b40f6707da88cbab3cc90953dced38c570024b94bb815f69b3a4c94ca5678ab", 0x8c, 0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)) (async) 07:33:04 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0xff0d) 07:33:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x14) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4, 0x8000, 0x7800, 0x4, 0x490}}) 07:33:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x5}}, 0x10) (async, rerun: 64) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x13, 0x5, 0x3, 0x20, 0x67cf58001de2e6b2, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x81, 0x3, 0xffff, 0x200, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x80, 0x2, @vifc_lcl_ifindex, @local}, 0x10) 07:33:05 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000180000012bbd7000fedbdf251d01060008000e00", @ANYRES32=0xee01, @ANYBLOB="15000300020000a0060200003eaf86af8a0e15e401000000150004000200002002010000467a5833724af47a0400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="1500020002000000060000000990b1097c2fa67c06000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendto(r0, &(0x7f0000000080)="4f9703f7510afb4aecca77ebfb9800527c973b259c3dd9612fba71cc426c52f57915bfe02133640ed5336f06c20e7fcebc9b8debfacb2765f742f1dd09eb8cb4e31e348cea49607a19874b00ad50f59a2ab35fde1684e353955d72750f843a336a458b9c2bfcde1c8f5ceb5e4b40f6707da88cbab3cc90953dced38c570024b94bb815f69b3a4c94ca5678ab", 0x8c, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00'}) (async) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000180000012bbd7000fedbdf251d01060008000e00", @ANYRES32=0xee01, @ANYBLOB="15000300020000a0060200003eaf86af8a0e15e401000000150004000200002002010000467a5833724af47a0400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="1500020002000000060000000990b1097c2fa67c06000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x10) (async) sendto(r0, &(0x7f0000000080)="4f9703f7510afb4aecca77ebfb9800527c973b259c3dd9612fba71cc426c52f57915bfe02133640ed5336f06c20e7fcebc9b8debfacb2765f742f1dd09eb8cb4e31e348cea49607a19874b00ad50f59a2ab35fde1684e353955d72750f843a336a458b9c2bfcde1c8f5ceb5e4b40f6707da88cbab3cc90953dced38c570024b94bb815f69b3a4c94ca5678ab", 0x8c, 0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)) (async) 07:33:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 64) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5, 0x80000}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x14) (rerun: 32) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:05 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0xff0d) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0xff0d) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x5}}, 0x10) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x13, 0x5, 0x3, 0x20, 0x67cf58001de2e6b2, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x81, 0x3, 0xffff, 0x200, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x81, 0x3, 0xffff, 0x200, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) bpf$MAP_CREATE(0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x80, 0x2, @vifc_lcl_ifindex, @local}, 0x10) 07:33:05 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x100, 0xffffb95b, 0xffffffc1, 0x80, r0, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0xe}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, 0x800, 0x0, 0xffffffffffffffff}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x9, 0x7, 0x9, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x71, &(0x7f0000000140)=""/113, 0x1f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xc, 0x8, 0x4}, 0x10, 0x24f82, r2, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r0]}, 0x80) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x3, 0x0, 0xff0d) 07:33:05 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040011) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) 07:33:05 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) socketpair(0x1f, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xca, "c3319c3078326e97583b6582a1ce3970ae107dda2e67024489f32e1f7750c7495bfe7b5e8ce0af05d713ab7eb363306744e33d64506b05226c7422619f653721a22310ad6850b7beff304ba4307c7a057719e4e9985ca7bbf589db8351696ab79fab00fe3faf9cb062ab58df545d58e0e542ee7007db91e2a8f49ef9ef4e62d66e2b421111fa4829cb45da74c307a69aa35e6b6a055e72cf9e2fcc5e7ab0a116083f4522820e52b33fe899a9d3e6238cfd43b3e0da44d0136665737caafe7ffaced705c4092809ad59a3"}, &(0x7f0000000340)=0xee) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x1e, 0x1, 0x7fffffff, 0x4, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8000, 0x6, 0x2a4}}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) 07:33:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x10, 0x3, 0x2, 0x1000, 0x1f, "8a8955ddf63c8810241107ddf310d425a00525620c31eecb43727ce5596a5dba30bc08773ba71d1ff1ef899e7250a28475c0a71cf9cf19d541ca435ce68dc9f395d9886eb6ad862b20743b02c24269f09b501e4ad2079c2939fd27aac223b6e8983aee6c0d6c4d7a9eba41779e3ea174733b6dbd072d98cd29ac0ec33ac7d3a2"}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r2, 0x8}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:05 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x100, 0xffffb95b, 0xffffffc1, 0x80, r0, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0xe}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, 0x800, 0x0, 0xffffffffffffffff}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x9, 0x7, 0x9, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x71, &(0x7f0000000140)=""/113, 0x1f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xc, 0x8, 0x4}, 0x10, 0x24f82, r2, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r0]}, 0x80) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2, 0x80000}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x100, 0xffffb95b, 0xffffffc1, 0x80, r0, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0xe}, 0x48) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, 0x800}) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x9, 0x7, 0x9, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x71, &(0x7f0000000140)=""/113, 0x1f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xc, 0x8, 0x4}, 0x10, 0x24f82, r2, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r0]}, 0x80) (async) 07:33:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040011) socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) 07:33:05 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) socketpair(0x1f, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xca, "c3319c3078326e97583b6582a1ce3970ae107dda2e67024489f32e1f7750c7495bfe7b5e8ce0af05d713ab7eb363306744e33d64506b05226c7422619f653721a22310ad6850b7beff304ba4307c7a057719e4e9985ca7bbf589db8351696ab79fab00fe3faf9cb062ab58df545d58e0e542ee7007db91e2a8f49ef9ef4e62d66e2b421111fa4829cb45da74c307a69aa35e6b6a055e72cf9e2fcc5e7ab0a116083f4522820e52b33fe899a9d3e6238cfd43b3e0da44d0136665737caafe7ffaced705c4092809ad59a3"}, &(0x7f0000000340)=0xee) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x1e, 0x1, 0x7fffffff, 0x4, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8000, 0x6, 0x2a4}}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) 07:33:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x10, 0x3, 0x2, 0x1000, 0x1f, "8a8955ddf63c8810241107ddf310d425a00525620c31eecb43727ce5596a5dba30bc08773ba71d1ff1ef899e7250a28475c0a71cf9cf19d541ca435ce68dc9f395d9886eb6ad862b20743b02c24269f09b501e4ad2079c2939fd27aac223b6e8983aee6c0d6c4d7a9eba41779e3ea174733b6dbd072d98cd29ac0ec33ac7d3a2"}) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r2, 0x8}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:05 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x100, 0xffffb95b, 0xffffffc1, 0x80, r0, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0xe}, 0x48) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, 0x800, 0x0, 0xffffffffffffffff}) (async, rerun: 32) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x9, 0x7, 0x9, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x71, &(0x7f0000000140)=""/113, 0x1f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xc, 0x8, 0x4}, 0x10, 0x24f82, r2, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r0]}, 0x80) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_newroute={0xdc, 0x18, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x84, 0x20, 0x8, 0xfd, 0x4, 0xfd, 0x8, 0x2200}, [@RTA_PREF={0x5, 0x14, 0xa}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x90, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x8c, 0x1, {0xa, 0x88, 0x1, 0x6, 0x8, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @dev={0xfe, 0x80, '\x00', 0x13}, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @private1]}}}, @RTA_UID={0x8, 0x19, r2}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x9}, @RTA_PREF={0x5, 0x14, 0x6}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x20040c44) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040011) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000}) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040011) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0x0) (async) 07:33:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:05 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) socketpair(0x1f, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xca, "c3319c3078326e97583b6582a1ce3970ae107dda2e67024489f32e1f7750c7495bfe7b5e8ce0af05d713ab7eb363306744e33d64506b05226c7422619f653721a22310ad6850b7beff304ba4307c7a057719e4e9985ca7bbf589db8351696ab79fab00fe3faf9cb062ab58df545d58e0e542ee7007db91e2a8f49ef9ef4e62d66e2b421111fa4829cb45da74c307a69aa35e6b6a055e72cf9e2fcc5e7ab0a116083f4522820e52b33fe899a9d3e6238cfd43b3e0da44d0136665737caafe7ffaced705c4092809ad59a3"}, &(0x7f0000000340)=0xee) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x1e, 0x1, 0x7fffffff, 0x4, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8000, 0x6, 0x2a4}}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) socketpair(0x1f, 0x2, 0x2, &(0x7f0000000000)) (async) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xca, "c3319c3078326e97583b6582a1ce3970ae107dda2e67024489f32e1f7750c7495bfe7b5e8ce0af05d713ab7eb363306744e33d64506b05226c7422619f653721a22310ad6850b7beff304ba4307c7a057719e4e9985ca7bbf589db8351696ab79fab00fe3faf9cb062ab58df545d58e0e542ee7007db91e2a8f49ef9ef4e62d66e2b421111fa4829cb45da74c307a69aa35e6b6a055e72cf9e2fcc5e7ab0a116083f4522820e52b33fe899a9d3e6238cfd43b3e0da44d0136665737caafe7ffaced705c4092809ad59a3"}, &(0x7f0000000340)=0xee) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x1e, 0x1, 0x7fffffff, 0x4, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8000, 0x6, 0x2a4}}) (async) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) (async) 07:33:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x10, 0x3, 0x2, 0x1000, 0x1f, "8a8955ddf63c8810241107ddf310d425a00525620c31eecb43727ce5596a5dba30bc08773ba71d1ff1ef899e7250a28475c0a71cf9cf19d541ca435ce68dc9f395d9886eb6ad862b20743b02c24269f09b501e4ad2079c2939fd27aac223b6e8983aee6c0d6c4d7a9eba41779e3ea174733b6dbd072d98cd29ac0ec33ac7d3a2"}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r2, 0x8}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:05 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0xff, 0x9bb5, @vifc_lcl_ifindex=r2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000140)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000}}, 0x10) 07:33:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000c40)={&(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x100000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x24, r0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff35cd}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000804}, 0x8010) recvmsg$can_bcm(r1, &(0x7f0000000780)={&(0x7f0000000540)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/78, 0x4e}, {&(0x7f00000006c0)=""/86, 0x56}], 0x3, &(0x7f0000000cc0)=""/235, 0xeb}, 0x40) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000040)={0x1, 0x0, 0x10, 0xaf66, @vifc_lcl_addr=@broadcast, @loopback}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000008c0)={&(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x4, 0x3, 0x4, 0x2}) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000980)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "69e7c8", "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"}}, 0x110) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000900)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500), &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0], 0x0, 0x2, 0x4, 0x0, r4}) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x1ff, @mcast1, 0x401}}}, 0x38) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r6, 0x2}}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x2, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r7, 0x800448d3, &(0x7f0000000400)={@none, 0xff, 0x2, 0x5, 0x3b6e, 0x5, "343b165d399c8869323100f00a49950a0710fb9e5e7b5eb699550298713164e4bba32828d1037b9a1aff8b295667b0d09a1ac88fe5023e8e7f0fa3704e231c9219dc11fb766355bcd4dd81cab667f591b0ee95036db615bacfa2670a7a304fb2e7c8ffb802784386f9f0ce235cf519615a35a9efee04d747a1aec2643cd1cd85"}) 07:33:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x105842, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:05 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}}, 0x0) ioprio_set$uid(0x3, 0x0, 0x2004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000004) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5f08dce0", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf250500000005002d00000000000a000900000000000000000008002b000000000008003200ff07000008003b0007000000"], 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4040804) ptrace$getenv(0x4201, r0, 0x22, &(0x7f0000000340)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="5f999337486ed10b6b335a1e2ca1f5e161433a78e6dccb11c93a916bbf12ef14a53a4639e34a181af7703e6d294700d2d272ea74c18fdc2972934898aeef8ba7844ca8dc5a0e135c7a1016e41ff9d37f59028a620fe6771011760d4edb4e93f1492800159048dfc90df57428a6f4a2dd5802ff49a0bdba1ddf5ccb860b609969565ad1b0b05d9f172cbbd0068965cbcbb6ed7baeda78cbd8e30e0a242a3cb7182238791198e26261012fd106bd9637fdf573de805c598cbbe9e7eb67b891a19482d0534289a4", &(0x7f0000000100)=""/101}, 0x20) 07:33:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x1, @vifc_lcl_addr=@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 07:33:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 07:33:06 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0xff, 0x9bb5, @vifc_lcl_ifindex=r2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000140)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000}}, 0x10) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)) (async) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0xff, 0x9bb5, @vifc_lcl_ifindex=r2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000140)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000}}, 0x10) (async) 07:33:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x1, @vifc_lcl_addr=@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 07:33:06 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}}, 0x0) ioprio_set$uid(0x3, 0x0, 0x2004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000004) (async) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5f08dce0", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf250500000005002d00000000000a000900000000000000000008002b000000000008003200ff07000008003b0007000000"], 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4040804) (async) ptrace$getenv(0x4201, r0, 0x22, &(0x7f0000000340)) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="5f999337486ed10b6b335a1e2ca1f5e161433a78e6dccb11c93a916bbf12ef14a53a4639e34a181af7703e6d294700d2d272ea74c18fdc2972934898aeef8ba7844ca8dc5a0e135c7a1016e41ff9d37f59028a620fe6771011760d4edb4e93f1492800159048dfc90df57428a6f4a2dd5802ff49a0bdba1ddf5ccb860b609969565ad1b0b05d9f172cbbd0068965cbcbb6ed7baeda78cbd8e30e0a242a3cb7182238791198e26261012fd106bd9637fdf573de805c598cbbe9e7eb67b891a19482d0534289a4", &(0x7f0000000100)=""/101}, 0x20) 07:33:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 07:33:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000c40)={&(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x100000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x24, r0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff35cd}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000804}, 0x8010) (async) recvmsg$can_bcm(r1, &(0x7f0000000780)={&(0x7f0000000540)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/78, 0x4e}, {&(0x7f00000006c0)=""/86, 0x56}], 0x3, &(0x7f0000000cc0)=""/235, 0xeb}, 0x40) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000040)={0x1, 0x0, 0x10, 0xaf66, @vifc_lcl_addr=@broadcast, @loopback}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000008c0)={&(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x4, 0x3, 0x4, 0x2}) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000980)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "69e7c8", "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"}}, 0x110) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000900)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500), &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0], 0x0, 0x2, 0x4, 0x0, r4}) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x1ff, @mcast1, 0x401}}}, 0x38) (async) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r6, 0x2}}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x2, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) (async) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r7, 0x800448d3, &(0x7f0000000400)={@none, 0xff, 0x2, 0x5, 0x3b6e, 0x5, "343b165d399c8869323100f00a49950a0710fb9e5e7b5eb699550298713164e4bba32828d1037b9a1aff8b295667b0d09a1ac88fe5023e8e7f0fa3704e231c9219dc11fb766355bcd4dd81cab667f591b0ee95036db615bacfa2670a7a304fb2e7c8ffb802784386f9f0ce235cf519615a35a9efee04d747a1aec2643cd1cd85"}) 07:33:06 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0xff, 0x9bb5, @vifc_lcl_ifindex=r2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000140)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000}}, 0x10) 07:33:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 07:33:06 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}}, 0x0) (async) ioprio_set$uid(0x3, 0x0, 0x2004) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000004) (async) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5f08dce0", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf250500000005002d00000000000a000900000000000000000008002b000000000008003200ff07000008003b0007000000"], 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4040804) (async) ptrace$getenv(0x4201, r0, 0x22, &(0x7f0000000340)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="5f999337486ed10b6b335a1e2ca1f5e161433a78e6dccb11c93a916bbf12ef14a53a4639e34a181af7703e6d294700d2d272ea74c18fdc2972934898aeef8ba7844ca8dc5a0e135c7a1016e41ff9d37f59028a620fe6771011760d4edb4e93f1492800159048dfc90df57428a6f4a2dd5802ff49a0bdba1ddf5ccb860b609969565ad1b0b05d9f172cbbd0068965cbcbb6ed7baeda78cbd8e30e0a242a3cb7182238791198e26261012fd106bd9637fdf573de805c598cbbe9e7eb67b891a19482d0534289a4", &(0x7f0000000100)=""/101}, 0x20) 07:33:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async, rerun: 32) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x1, @vifc_lcl_addr=@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) (rerun: 32) 07:33:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000c40)={&(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x100000, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x24, r0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff35cd}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000804}, 0x8010) (async) recvmsg$can_bcm(r1, &(0x7f0000000780)={&(0x7f0000000540)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/78, 0x4e}, {&(0x7f00000006c0)=""/86, 0x56}], 0x3, &(0x7f0000000cc0)=""/235, 0xeb}, 0x40) (async, rerun: 64) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000040)={0x1, 0x0, 0x10, 0xaf66, @vifc_lcl_addr=@broadcast, @loopback}, 0x10) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000008c0)={&(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x4, 0x3, 0x4, 0x2}) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000980)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "69e7c8", "6a2cb0bcf046e0df7ac96c3a57a4e440b4f83dd2eb85acda45cea0336982d400cdc570d57e89ec9a427488cbfcbd37a9bb9b7812158f2e57c1804bd29802c86f2679822e5f2d945d78c6b4698f22a82d86fe2a4677b868312236605cb08ab90c9510247a8aac26a2dbfab60c7d3b43dbb36ff6a55c858cee455701715ba536f8072c5c26774d0b90d3e2c8622a357add543ba2a64bae91d432b7aad5566f916ff6630ef0ef351c2e2daaae6c6d5bfe6d2460f48087a85ad3606078eddbf3be6d45fbc1885f1a344cf34d750212dbc31f3f70cf730d4520822655b96db2188312ce454dcef7cc2e78ef3e356671e750b2803c452d9d0a3ed2413bbdb436a25627"}}, 0x110) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000900)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500), &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0], 0x0, 0x2, 0x4, 0x0, r4}) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x1ff, @mcast1, 0x401}}}, 0x38) (async) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r6, 0x2}}, 0x18) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x2, 0x0, 0x0) (async) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) (async, rerun: 64) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r7, 0x800448d3, &(0x7f0000000400)={@none, 0xff, 0x2, 0x5, 0x3b6e, 0x5, "343b165d399c8869323100f00a49950a0710fb9e5e7b5eb699550298713164e4bba32828d1037b9a1aff8b295667b0d09a1ac88fe5023e8e7f0fa3704e231c9219dc11fb766355bcd4dd81cab667f591b0ee95036db615bacfa2670a7a304fb2e7c8ffb802784386f9f0ce235cf519615a35a9efee04d747a1aec2643cd1cd85"}) (rerun: 64) 07:33:06 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r0, 0x9, 0x80000}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000002408000003000000000000002ba7f06da7359f588949ce9f0519cf5b1a6ccb8ce19419dcbf7148b36c2ef842ea98894e46d8b4b2e8e9ee8e70a3f85710e8027beddf519a7aca39cc2e647c03faf25afaaca60a22fd8a89a7b8bc97ab227315ac4421d7cf800080b2a5b37963217055317b94abe13b20d57b8682a84eee06788a1e23120aa4c7e2488648ee2e5535aee11908", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+60000, @ANYBLOB="000000e00100000001000000015100003cb2282d92b086aa"], 0x48}, 0x1, 0x0, 0x0, 0x28000}, 0x4000000) 07:33:06 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x4, 0x96}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="34000004", @ANYRES16=r2, @ANYBLOB="02002cbd7000fddbdf25070000000500380001000000080034000600000008003a00070000000800390004000000"], 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x40) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000200)='GPL\x00', 0x61b6, 0xde, &(0x7f0000000240)=""/222, 0x41000, 0x9, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r3, 0x1]}, 0x80) 07:33:06 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0xffffffffffffffe5) 07:33:06 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000001) r3 = syz_open_dev$audion(&(0x7f00000011c0), 0x8, 0x40) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000001200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bpf$MAP_CREATE(0x9, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r8, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000001440)={0xb, 0x10, 0xfa00, {&(0x7f0000001380), r8, 0x7a67542a}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="180000009b0700000000000099000000183000000400000000000000000000008510000000000000950000000000000045bdf45471c0e557f6376dab9b3013348c56f8c3afb04fcacdb209c66ca1735026f71e1473ae9e8127e6ca6cd70f75747bd6ed9c7beb042011afe845d3464d03e2df866bbccb9c"], &(0x7f0000000040)='GPL\x00', 0x2fc, 0x1000, &(0x7f0000000080)=""/4096, 0x100, 0x8, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001080)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000010c0)={0x4, 0xc, 0x800, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[r0, r4, r0, r5]}, 0x80) 07:33:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000040)={0x9}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000380)={&(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040), &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4, 0x4}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000540)={0x400, r2, r3}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:33:06 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r0, 0x9, 0x80000}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000002408000003000000000000002ba7f06da7359f588949ce9f0519cf5b1a6ccb8ce19419dcbf7148b36c2ef842ea98894e46d8b4b2e8e9ee8e70a3f85710e8027beddf519a7aca39cc2e647c03faf25afaaca60a22fd8a89a7b8bc97ab227315ac4421d7cf800080b2a5b37963217055317b94abe13b20d57b8682a84eee06788a1e23120aa4c7e2488648ee2e5535aee11908", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+60000, @ANYBLOB="000000e00100000001000000015100003cb2282d92b086aa"], 0x48}, 0x1, 0x0, 0x0, 0x28000}, 0x4000000) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r0, 0x9, 0x80000}) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000002408000003000000000000002ba7f06da7359f588949ce9f0519cf5b1a6ccb8ce19419dcbf7148b36c2ef842ea98894e46d8b4b2e8e9ee8e70a3f85710e8027beddf519a7aca39cc2e647c03faf25afaaca60a22fd8a89a7b8bc97ab227315ac4421d7cf800080b2a5b37963217055317b94abe13b20d57b8682a84eee06788a1e23120aa4c7e2488648ee2e5535aee11908", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+60000, @ANYBLOB="000000e00100000001000000015100003cb2282d92b086aa"], 0x48}, 0x1, 0x0, 0x0, 0x28000}, 0x4000000) (async) 07:33:06 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0xffffffffffffffe5) (rerun: 64) 07:33:06 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x4, 0x96}, 0x48) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="34000004", @ANYRES16=r2, @ANYBLOB="02002cbd7000fddbdf25070000000500380001000000080034000600000008003a00070000000800390004000000"], 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x40) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000200)='GPL\x00', 0x61b6, 0xde, &(0x7f0000000240)=""/222, 0x41000, 0x9, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r3, 0x1]}, 0x80) 07:33:06 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000001) (async) r3 = syz_open_dev$audion(&(0x7f00000011c0), 0x8, 0x40) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000001200)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bpf$MAP_CREATE(0x9, 0x0, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r8, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000001440)={0xb, 0x10, 0xfa00, {&(0x7f0000001380), r8, 0x7a67542a}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="180000009b0700000000000099000000183000000400000000000000000000008510000000000000950000000000000045bdf45471c0e557f6376dab9b3013348c56f8c3afb04fcacdb209c66ca1735026f71e1473ae9e8127e6ca6cd70f75747bd6ed9c7beb042011afe845d3464d03e2df866bbccb9c"], &(0x7f0000000040)='GPL\x00', 0x2fc, 0x1000, &(0x7f0000000080)=""/4096, 0x100, 0x8, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001080)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000010c0)={0x4, 0xc, 0x800, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[r0, r4, r0, r5]}, 0x80) 07:33:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000040)={0x9}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000380)={&(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040), &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4, 0x4}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000540)={0x400, r2, r3}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:33:06 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r0, 0x9, 0x80000}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000002408000003000000000000002ba7f06da7359f588949ce9f0519cf5b1a6ccb8ce19419dcbf7148b36c2ef842ea98894e46d8b4b2e8e9ee8e70a3f85710e8027beddf519a7aca39cc2e647c03faf25afaaca60a22fd8a89a7b8bc97ab227315ac4421d7cf800080b2a5b37963217055317b94abe13b20d57b8682a84eee06788a1e23120aa4c7e2488648ee2e5535aee11908", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+60000, @ANYBLOB="000000e00100000001000000015100003cb2282d92b086aa"], 0x48}, 0x1, 0x0, 0x0, 0x28000}, 0x4000000) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r0, 0x9, 0x80000}) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000002408000003000000000000002ba7f06da7359f588949ce9f0519cf5b1a6ccb8ce19419dcbf7148b36c2ef842ea98894e46d8b4b2e8e9ee8e70a3f85710e8027beddf519a7aca39cc2e647c03faf25afaaca60a22fd8a89a7b8bc97ab227315ac4421d7cf800080b2a5b37963217055317b94abe13b20d57b8682a84eee06788a1e23120aa4c7e2488648ee2e5535aee11908", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+60000, @ANYBLOB="000000e00100000001000000015100003cb2282d92b086aa"], 0x48}, 0x1, 0x0, 0x0, 0x28000}, 0x4000000) (async) 07:33:06 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x4, 0x96}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="34000004", @ANYRES16=r2, @ANYBLOB="02002cbd7000fddbdf25070000000500380001000000080034000600000008003a00070000000800390004000000"], 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x40) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000200)='GPL\x00', 0x61b6, 0xde, &(0x7f0000000240)=""/222, 0x41000, 0x9, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r3, 0x1]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000200)='GPL\x00', 0x61b6, 0xde, &(0x7f0000000240)=""/222, 0x41000, 0x9, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r3, 0x1]}, 0x80) 07:33:06 executing program 4: r0 = bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000001) r3 = syz_open_dev$audion(&(0x7f00000011c0), 0x8, 0x40) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000001200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) bpf$MAP_CREATE(0x9, 0x0, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r8, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000001440)={0xb, 0x10, 0xfa00, {&(0x7f0000001380), r8, 0x7a67542a}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="180000009b0700000000000099000000183000000400000000000000000000008510000000000000950000000000000045bdf45471c0e557f6376dab9b3013348c56f8c3afb04fcacdb209c66ca1735026f71e1473ae9e8127e6ca6cd70f75747bd6ed9c7beb042011afe845d3464d03e2df866bbccb9c"], &(0x7f0000000040)='GPL\x00', 0x2fc, 0x1000, &(0x7f0000000080)=""/4096, 0x100, 0x8, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001080)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000010c0)={0x4, 0xc, 0x800, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[r0, r4, r0, r5]}, 0x80) 07:33:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0xffffffffffffffe5) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0xffffffffffffffe5) (async) 07:33:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000040)={0x9}) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000380)={&(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000040), &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4, 0x4}) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000540)={0x400, r2, r3}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) 07:33:06 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:06 executing program 2: r0 = userfaultfd(0x80800) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x31b680, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, 0x2000, 0x1}) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0x64010101}, @ib={0x1b, 0x0, 0x0, {"1e39774ae8e89cfc42ee2567e8335c4f"}, 0x6, 0x0, 0x100}}}, 0x118) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x80, 0x8001, 0x31, @rand_addr=' \x01\x00', @private2, 0x747, 0x20, 0x0, 0x10001}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x7, 0x7, 0x1, @mcast2, @mcast1, 0x1, 0x10, 0x80000001, 0x6}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x288c41, 0x0) syz_open_dev$audion(&(0x7f0000000040), 0x9, 0x8000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffff9) 07:33:07 executing program 2: userfaultfd(0x80800) (async) r0 = userfaultfd(0x80800) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x31b680, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, 0x2000, 0x1}) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0x64010101}, @ib={0x1b, 0x0, 0x0, {"1e39774ae8e89cfc42ee2567e8335c4f"}, 0x6, 0x0, 0x100}}}, 0x118) 07:33:07 executing program 4: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000140)=""/140) bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={0x0, 0x5, 0x4}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x20044810}, 0x4040001) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x80, 0x8001, 0x31, @rand_addr=' \x01\x00', @private2, 0x747, 0x20, 0x0, 0x10001}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x7, 0x7, 0x1, @mcast2, @mcast1, 0x1, 0x10, 0x80000001, 0x6}}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x288c41, 0x0) (async) syz_open_dev$audion(&(0x7f0000000040), 0x9, 0x8000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffff9) 07:33:07 executing program 4: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000140)=""/140) (async) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async, rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={0x0, 0x5, 0x4}) (async, rerun: 64) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x20044810}, 0x4040001) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x80, 0x8001, 0x31, @rand_addr=' \x01\x00', @private2, 0x747, 0x20, 0x0, 0x10001}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x7, 0x7, 0x1, @mcast2, @mcast1, 0x1, 0x10, 0x80000001, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x7, 0x7, 0x1, @mcast2, @mcast1, 0x1, 0x10, 0x80000001, 0x6}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:07 executing program 2: r0 = userfaultfd(0x80800) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x31b680, 0x0) (async) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, 0x2000, 0x1}) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0x64010101}, @ib={0x1b, 0x0, 0x0, {"1e39774ae8e89cfc42ee2567e8335c4f"}, 0x6, 0x0, 0x100}}}, 0x118) 07:33:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) (async) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x288c41, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x288c41, 0x0) syz_open_dev$audion(&(0x7f0000000040), 0x9, 0x8000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2, 0x0, 0xfffffffffffffff9) 07:33:07 executing program 4: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000140)=""/140) (async) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={0x0, 0x5, 0x4}) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x20044810}, 0x4040001) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000000)={0x1}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:07 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000080)={0x0, 0x1, 0x9}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) recvmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000180)=""/237, 0xed}], 0x2, &(0x7f0000000380)=""/178, 0xb2}, 0x40000002) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 07:33:07 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@bloom_filter={0x1e, 0x4, 0xb0, 0x401, 0x100, r0, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xc}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001680)={&(0x7f0000000400)="5c8db52c2e8717f126c2c2c58694ed61a14842087816f526de2b86a7471c554def0ba4845566f743b80a57d4d08e4569d84a51565ad43154480b0f0248b15359716788c947d584a32d4a6b8d88f58de4fa9fd1a6504ef9a1b0e859876bf3a454d92d3cb7357ef22dbaff487dc97263579b96fdec496420cf2849200c9c0187434aec6316071ea99c5f7d7f50a920ba9a371c3ea4b1e369b027e28783ac", &(0x7f00000004c0)=""/4096, &(0x7f00000014c0)="51bb951899a5fa7197f2bddfe7ed30a573e7fbd7e5fd39d7774ead12ece379dacbf3113e1da1fa2dd17bedc6d4776b5fb42904378b73ac06c145eb3455a4d76bd18cd0cef11014ef6991972dc4ebd5be227d9b3c056d6d333c7e31750f7112229a05d51828435330f9edd6135ed5a49ff86b33ed404843d7014f3aa5d1589cbaa6b8eaa458e5988edcc260dd185470c02dd3508230a55480776627209473856ceebb9005c96dd3a5992e54b5f1fd1451b6d7203d42d944578bc77f2dc646ce4aa900078457700f1841bc2396d76028a2fd5b9b76a714026f9098de1fd195a564879a59cfd9", &(0x7f00000015c0)="29c25b97528332bf60cb30f3f8206edc38152a3372d1482a9c5513ef4385c8e45e93cd56df8f9002ebeb83", 0x2, r4}, 0x38) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x0, 0x10001, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x0, 0x2, 0x4}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x5380ac6eada93123, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x24044044}, 0x4000) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000000)={0x1}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x31) 07:33:07 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000080)={0x0, 0x1, 0x9}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) recvmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000180)=""/237, 0xed}], 0x2, &(0x7f0000000380)=""/178, 0xb2}, 0x40000002) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 4: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@none, 0x7fe00000}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x44, 0xb4, {}, {}, {0x2}, 0x1, @canfd={{0x2, 0x0, 0x1, 0x1}, 0x31, 0x2, 0x0, 0x0, "9e84e0ea3fa54cbc286e41409d736c99671d0262b37d6766e3471bfe616e41e1ad2df51cf7ab6fb83bc3fde2f7e5e9ad6c2f583bb7e811cc496970d9afec9f5d"}}, 0x80}, 0x1, 0x0, 0x0, 0x488c0}, 0x4000) bpf$MAP_CREATE(0x3, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), 0xffffffffffffffff, 0x2}}, 0x18) 07:33:07 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@bloom_filter={0x1e, 0x4, 0xb0, 0x401, 0x100, r0, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xc}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001680)={&(0x7f0000000400)="5c8db52c2e8717f126c2c2c58694ed61a14842087816f526de2b86a7471c554def0ba4845566f743b80a57d4d08e4569d84a51565ad43154480b0f0248b15359716788c947d584a32d4a6b8d88f58de4fa9fd1a6504ef9a1b0e859876bf3a454d92d3cb7357ef22dbaff487dc97263579b96fdec496420cf2849200c9c0187434aec6316071ea99c5f7d7f50a920ba9a371c3ea4b1e369b027e28783ac", &(0x7f00000004c0)=""/4096, &(0x7f00000014c0)="51bb951899a5fa7197f2bddfe7ed30a573e7fbd7e5fd39d7774ead12ece379dacbf3113e1da1fa2dd17bedc6d4776b5fb42904378b73ac06c145eb3455a4d76bd18cd0cef11014ef6991972dc4ebd5be227d9b3c056d6d333c7e31750f7112229a05d51828435330f9edd6135ed5a49ff86b33ed404843d7014f3aa5d1589cbaa6b8eaa458e5988edcc260dd185470c02dd3508230a55480776627209473856ceebb9005c96dd3a5992e54b5f1fd1451b6d7203d42d944578bc77f2dc646ce4aa900078457700f1841bc2396d76028a2fd5b9b76a714026f9098de1fd195a564879a59cfd9", &(0x7f00000015c0)="29c25b97528332bf60cb30f3f8206edc38152a3372d1482a9c5513ef4385c8e45e93cd56df8f9002ebeb83", 0x2, r4}, 0x38) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x0, 0x10001, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x0, 0x2, 0x4}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x5380ac6eada93123, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x24044044}, 0x4000) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000000)={0x1}) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x31) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x31) (async) 07:33:07 executing program 4: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@none, 0x7fe00000}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x44, 0xb4, {}, {}, {0x2}, 0x1, @canfd={{0x2, 0x0, 0x1, 0x1}, 0x31, 0x2, 0x0, 0x0, "9e84e0ea3fa54cbc286e41409d736c99671d0262b37d6766e3471bfe616e41e1ad2df51cf7ab6fb83bc3fde2f7e5e9ad6c2f583bb7e811cc496970d9afec9f5d"}}, 0x80}, 0x1, 0x0, 0x0, 0x488c0}, 0x4000) bpf$MAP_CREATE(0x3, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@none, 0x7fe00000}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000}) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)) (async) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x44, 0xb4, {}, {}, {0x2}, 0x1, @canfd={{0x2, 0x0, 0x1, 0x1}, 0x31, 0x2, 0x0, 0x0, "9e84e0ea3fa54cbc286e41409d736c99671d0262b37d6766e3471bfe616e41e1ad2df51cf7ab6fb83bc3fde2f7e5e9ad6c2f583bb7e811cc496970d9afec9f5d"}}, 0x80}, 0x1, 0x0, 0x0, 0x488c0}, 0x4000) (async) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), 0xffffffffffffffff, 0x2}}, 0x18) (async) 07:33:07 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000080)={0x0, 0x1, 0x9}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) recvmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000180)=""/237, 0xed}], 0x2, &(0x7f0000000380)=""/178, 0xb2}, 0x40000002) socket$inet6_udp(0xa, 0x2, 0x0) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x88, 0x22, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x88, 0x22, 0x0, 0x0) 07:33:07 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@bloom_filter={0x1e, 0x4, 0xb0, 0x401, 0x100, r0, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xc}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001680)={&(0x7f0000000400)="5c8db52c2e8717f126c2c2c58694ed61a14842087816f526de2b86a7471c554def0ba4845566f743b80a57d4d08e4569d84a51565ad43154480b0f0248b15359716788c947d584a32d4a6b8d88f58de4fa9fd1a6504ef9a1b0e859876bf3a454d92d3cb7357ef22dbaff487dc97263579b96fdec496420cf2849200c9c0187434aec6316071ea99c5f7d7f50a920ba9a371c3ea4b1e369b027e28783ac", &(0x7f00000004c0)=""/4096, &(0x7f00000014c0)="51bb951899a5fa7197f2bddfe7ed30a573e7fbd7e5fd39d7774ead12ece379dacbf3113e1da1fa2dd17bedc6d4776b5fb42904378b73ac06c145eb3455a4d76bd18cd0cef11014ef6991972dc4ebd5be227d9b3c056d6d333c7e31750f7112229a05d51828435330f9edd6135ed5a49ff86b33ed404843d7014f3aa5d1589cbaa6b8eaa458e5988edcc260dd185470c02dd3508230a55480776627209473856ceebb9005c96dd3a5992e54b5f1fd1451b6d7203d42d944578bc77f2dc646ce4aa900078457700f1841bc2396d76028a2fd5b9b76a714026f9098de1fd195a564879a59cfd9", &(0x7f00000015c0)="29c25b97528332bf60cb30f3f8206edc38152a3372d1482a9c5513ef4385c8e45e93cd56df8f9002ebeb83", 0x2, r4}, 0x38) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x0, 0x10001, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x0, 0x2, 0x4}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x5380ac6eada93123, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x24044044}, 0x4000) 07:33:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 07:33:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x31) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x31) (async) 07:33:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0xffffffff, 0x100, "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", 0x48, 0x31, 0xe9, 0x3, 0x1f, 0x2, 0x5, 0x1}}}, 0x128) 07:33:08 executing program 4: ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={@none, 0x7fe00000}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x44, 0xb4, {}, {}, {0x2}, 0x1, @canfd={{0x2, 0x0, 0x1, 0x1}, 0x31, 0x2, 0x0, 0x0, "9e84e0ea3fa54cbc286e41409d736c99671d0262b37d6766e3471bfe616e41e1ad2df51cf7ab6fb83bc3fde2f7e5e9ad6c2f583bb7e811cc496970d9afec9f5d"}}, 0x80}, 0x1, 0x0, 0x0, 0x488c0}, 0x4000) (async, rerun: 32) bpf$MAP_CREATE(0x3, 0x0, 0x0) (rerun: 32) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), 0xffffffffffffffff, 0x2}}, 0x18) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:08 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40880}, 0x40800) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="1800f8ff00181000"/25, @ANYRES32=r0, @ANYBLOB="0000000000000000185a00000200000000000000000000000f500000090000008500000000020000cf8706000800000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x2, 0xbf}, 0x10}, 0x80) 07:33:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x4, 0x20000009) r0 = socket$inet6(0xa, 0xa, 0x7) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x3ff, 0x0, 0x0, 0x1, 0x3f, 0x8}, &(0x7f0000000040)=0x20) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0xffffffff, 0x100, "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", 0x48, 0x31, 0xe9, 0x3, 0x1f, 0x2, 0x5, 0x1}}}, 0x128) 07:33:08 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40880}, 0x40800) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="1800f8ff00181000"/25, @ANYRES32=r0, @ANYBLOB="0000000000000000185a00000200000000000000000000000f500000090000008500000000020000cf8706000800000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x2, 0xbf}, 0x10}, 0x80) 07:33:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="c8760c01e9e57c54b62c7a6fc11dbd331fae518ff3ba66c17536657879180f839d902f562869d25d00bb3f84ea8f036a0d83f452e98008d5cb0f9a2c2193806713f78ec912162c9ec8e4ac39623da76c4dceb5c0fa497173a54ac3fe7b9d08df75df748f7084ea3499d7342fe562cd50af7762e46165a66fc831b12f52c449973fd570affe31e325d363429de4028c4b559f3340463426dccd3cbe7634479460988790e23667754684bcebbce978e60042678d9c2405143f0ed4bfe5ccdb0db8b6f698d4940e00a927a5e9d5cc763e037647691edfc939fe23a19a83a31dcf7d57935c74794696b9ad3590aa", 0xec, 0x11, 0x0, 0x0) 07:33:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdb2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000011) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r2, 0x2f, 0x81, 0x40, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, 0x7800, 0x40, 0x8b6, 0x10000}}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x27}, 0x3f}}}, 0x30) bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:33:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async, rerun: 32) socket$bt_cmtp(0x1f, 0x3, 0x5) (async, rerun: 32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0xffffffff, 0x100, "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", 0x48, 0x31, 0xe9, 0x3, 0x1f, 0x2, 0x5, 0x1}}}, 0x128) 07:33:08 executing program 2: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wg0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40880}, 0x40800) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="1800f8ff00181000"/25, @ANYRES32=r0, @ANYBLOB="0000000000000000185a00000200000000000000000000000f500000090000008500000000020000cf8706000800000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x2, 0xbf}, 0x10}, 0x80) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdb2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000011) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r2, 0x2f, 0x81, 0x40, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, 0x7800, 0x40, 0x8b6, 0x10000}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r2, 0x2f, 0x81, 0x40, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, 0x7800, 0x40, 0x8b6, 0x10000}}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x27}, 0x3f}}}, 0x30) bpf$MAP_CREATE(0x3, 0x0, 0x0) 07:33:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) sendto(r0, &(0x7f0000000000)="c8760c01e9e57c54b62c7a6fc11dbd331fae518ff3ba66c17536657879180f839d902f562869d25d00bb3f84ea8f036a0d83f452e98008d5cb0f9a2c2193806713f78ec912162c9ec8e4ac39623da76c4dceb5c0fa497173a54ac3fe7b9d08df75df748f7084ea3499d7342fe562cd50af7762e46165a66fc831b12f52c449973fd570affe31e325d363429de4028c4b559f3340463426dccd3cbe7634479460988790e23667754684bcebbce978e60042678d9c2405143f0ed4bfe5ccdb0db8b6f698d4940e00a927a5e9d5cc763e037647691edfc939fe23a19a83a31dcf7d57935c74794696b9ad3590aa", 0xec, 0x11, 0x0, 0x0) 07:33:08 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x58, 0x9, 0x366, 0xc, r0, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3}, 0x48) 07:33:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x4, 0x20000009) r0 = socket$inet6(0xa, 0xa, 0x7) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x3ff, 0x0, 0x0, 0x1, 0x3f, 0x8}, &(0x7f0000000040)=0x20) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6(0xa, 0x4, 0x20000009) (async) socket$inet6(0xa, 0xa, 0x7) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x3ff, 0x0, 0x0, 0x1, 0x3f, 0x8}, &(0x7f0000000040)=0x20) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0xf8b0, 0x7aa00000, 0x1}}) 07:33:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdb2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000011) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r2, 0x2f, 0x81, 0x40, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, 0x7800, 0x40, 0x8b6, 0x10000}}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x27}, 0x3f}}}, 0x30) bpf$MAP_CREATE(0x3, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdb2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000011) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r2, 0x2f, 0x81, 0x40, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, 0x7800, 0x40, 0x8b6, 0x10000}}) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x27}, 0x3f}}}, 0x30) (async) bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) 07:33:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 07:33:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="c8760c01e9e57c54b62c7a6fc11dbd331fae518ff3ba66c17536657879180f839d902f562869d25d00bb3f84ea8f036a0d83f452e98008d5cb0f9a2c2193806713f78ec912162c9ec8e4ac39623da76c4dceb5c0fa497173a54ac3fe7b9d08df75df748f7084ea3499d7342fe562cd50af7762e46165a66fc831b12f52c449973fd570affe31e325d363429de4028c4b559f3340463426dccd3cbe7634479460988790e23667754684bcebbce978e60042678d9c2405143f0ed4bfe5ccdb0db8b6f698d4940e00a927a5e9d5cc763e037647691edfc939fe23a19a83a31dcf7d57935c74794696b9ad3590aa", 0xec, 0x11, 0x0, 0x0) 07:33:08 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x58, 0x9, 0x366, 0xc, r0, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3}, 0x48) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x0, 0x7aa00000, 0x1}}) 07:33:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) (rerun: 32) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 07:33:08 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x7, 0x716, 0x28, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x8000, 0xfffffffb, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x9b}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0x7bc20649, 0x50, &(0x7f00000000c0)=""/80, 0x40f00, 0x6, '\x00', r1, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x9, 0x5, 0xffff}, 0x10, 0xffffffffffffffff}, 0x80) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x0, 0x0, 0x1}}) 07:33:08 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x58, 0x9, 0x366, 0xc, r0, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x58, 0x9, 0x366, 0xc, r0, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3}, 0x48) (async) 07:33:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x4, 0x20000009) r0 = socket$inet6(0xa, 0xa, 0x7) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x3ff, 0x0, 0x0, 0x1, 0x3f, 0x8}, &(0x7f0000000040)=0x20) socket$inet6_udp(0xa, 0x2, 0x0) 07:33:08 executing program 3: times(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:08 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10c00, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x7, 0x716, 0x28, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x8000, 0xfffffffb, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x9b}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0x7bc20649, 0x50, &(0x7f00000000c0)=""/80, 0x40f00, 0x6, '\x00', r1, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x9, 0x5, 0xffff}, 0x10, 0xffffffffffffffff}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x9b}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0x7bc20649, 0x50, &(0x7f00000000c0)=""/80, 0x40f00, 0x6, '\x00', r1, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x9, 0x5, 0xffff}, 0x10, 0xffffffffffffffff}, 0x80) 07:33:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 07:33:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 07:33:09 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x4e21, 0x7f, 0x4e24, 0xdcc, 0xa, 0xc0, 0x1a0, 0x33, 0x0, 0xee01}, {0x3, 0x77a6, 0x100, 0x94cc, 0x6, 0x8000000000000001, 0x7, 0x6}, {0x401, 0xffff, 0x2, 0x3}, 0x101, 0x6e6bb7, 0x0, 0x1, 0xa87d8900b2f79cc3, 0x2}, {{@in=@loopback, 0x4d5}, 0xa, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x3502, 0x1, 0x0, 0x1f, 0x7, 0x1fd2, 0x5}}, 0xe8) 07:33:09 executing program 3: times(&(0x7f0000000100)) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) bpf$MAP_CREATE(0xc, 0x0, 0x0) (async) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 64) times(&(0x7f00000000c0)) (async, rerun: 64) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:09 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10c00, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x7, 0x716, 0x28, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x8000, 0xfffffffb, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x9b}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0x7bc20649, 0x50, &(0x7f00000000c0)=""/80, 0x40f00, 0x6, '\x00', r1, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x9, 0x5, 0xffff}, 0x10, 0xffffffffffffffff}, 0x80) 07:33:09 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x4e21, 0x7f, 0x4e24, 0xdcc, 0xa, 0xc0, 0x1a0, 0x33, 0x0, 0xee01}, {0x3, 0x77a6, 0x100, 0x94cc, 0x6, 0x8000000000000001, 0x7, 0x6}, {0x401, 0xffff, 0x2, 0x3}, 0x101, 0x6e6bb7, 0x0, 0x1, 0xa87d8900b2f79cc3, 0x2}, {{@in=@loopback, 0x4d5}, 0xa, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x3502, 0x1, 0x0, 0x1f, 0x7, 0x1fd2, 0x5}}, 0xe8) 07:33:09 executing program 1: times(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:09 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000880)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000900)={0x5, 0x10, 0xfa00, {&(0x7f0000000680), r7, 0x1}}, 0x18) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f00000005c0)=0x2) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @local, 0x1f}, r2}}, 0x30) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x3, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r10, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r11, 0x80000}}, 0x10) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa07, &(0x7f0000000600)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r9, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r11, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x1e, 0x62d, {"5ffac2e1ef8ba5d51983a930370a6cdb"}, 0x3, 0x8000000000000000, 0xcdee}, @ib={0x1b, 0x3, 0xffff, {"3b31ee4445728103f6e8fb3ffc4cae4b"}, 0x7, 0x790, 0x4d79}}}, 0x118) 07:33:09 executing program 3: times(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) times(&(0x7f0000000100)) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) bpf$MAP_CREATE(0xc, 0x0, 0x0) (async) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)) (async) times(&(0x7f00000000c0)) (async) times(&(0x7f0000000080)) (async) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) 07:33:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:09 executing program 1: times(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x1c) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file1\x00', r1}, 0x10) 07:33:09 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) (async) bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x4e21, 0x7f, 0x4e24, 0xdcc, 0xa, 0xc0, 0x1a0, 0x33, 0x0, 0xee01}, {0x3, 0x77a6, 0x100, 0x94cc, 0x6, 0x8000000000000001, 0x7, 0x6}, {0x401, 0xffff, 0x2, 0x3}, 0x101, 0x6e6bb7, 0x0, 0x1, 0xa87d8900b2f79cc3, 0x2}, {{@in=@loopback, 0x4d5}, 0xa, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x3502, 0x1, 0x0, 0x1f, 0x7, 0x1fd2, 0x5}}, 0xe8) 07:33:09 executing program 3: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002bbd7000fddbdf252e00000005002b000100000008000200", @ANYRES32=0x0, @ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00'], 0x3c}, 0x1, 0x0, 0x0, 0x488c1}, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x30) 07:33:09 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000880)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000900)={0x5, 0x10, 0xfa00, {&(0x7f0000000680), r7, 0x1}}, 0x18) (async) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f00000005c0)=0x2) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), r4, 0x1}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @local, 0x1f}, r2}}, 0x30) (rerun: 64) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x3, 0x0, 0x0) (async, rerun: 32) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) (async) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r10, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r11, 0x80000}}, 0x10) (async) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa07, &(0x7f0000000600)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280), 0x106, 0x4}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r9, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r11, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x1e, 0x62d, {"5ffac2e1ef8ba5d51983a930370a6cdb"}, 0x3, 0x8000000000000000, 0xcdee}, @ib={0x1b, 0x3, 0xffff, {"3b31ee4445728103f6e8fb3ffc4cae4b"}, 0x7, 0x790, 0x4d79}}}, 0x118) 07:33:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:09 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080), 0x2f4ed723, 0x240800) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r2, r3}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) syz_open_dev$audion(&(0x7f00000001c0), 0x7fffffffffffffff, 0x44000) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0xa}) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x400200, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0xffffffffffffff7d) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@bloom_filter={0x1e, 0x1f, 0xffffff44, 0x3f, 0x481, 0x1, 0x5, '\x00', r8, r9, 0x2, 0x0, 0x3, 0xb}, 0x48) 07:33:09 executing program 1: times(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 07:33:09 executing program 3: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002bbd7000fddbdf252e00000005002b000100000008000200", @ANYRES32=0x0, @ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00'], 0x3c}, 0x1, 0x0, 0x0, 0x488c1}, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x30) 07:33:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 07:33:09 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x0, 0x0, 0xffffffffffffffff}) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x80000}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000880)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000900)={0x5, 0x10, 0xfa00, {&(0x7f0000000680), r7, 0x1}}, 0x18) (async) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f00000005c0)=0x2) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x80000}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), r4, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @local, 0x1f}, r2}}, 0x30) (async) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x3, 0x0, 0x0) (async) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r10, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r11, 0x80000}}, 0x10) (async) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa07, &(0x7f0000000600)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r9, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r11, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x1e, 0x62d, {"5ffac2e1ef8ba5d51983a930370a6cdb"}, 0x3, 0x8000000000000000, 0xcdee}, @ib={0x1b, 0x3, 0xffff, {"3b31ee4445728103f6e8fb3ffc4cae4b"}, 0x7, 0x790, 0x4d79}}}, 0x118) 07:33:09 executing program 1: times(&(0x7f0000000100)) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x0, 0xff}, 0x2}, 0x18) 07:33:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x29, 0x64, 0x7d, 0x4, 0x22, @private1, @remote, 0x7800, 0x40, 0x9, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x114, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8e9ba6ccb498b461}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}]}, @HEADER={0x4}]}, 0x114}, 0x1, 0x0, 0x0, 0x40050}, 0xe152374bf8c119db) [ 1106.015034][T20423] list_del corruption. next->prev should be ffff888079f2b000, but was dead000000000122. (next=ffff888023111000) 07:33:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x1c) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file1\x00', r1}, 0x10) 07:33:09 executing program 1: times(&(0x7f0000000100)) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)) times(&(0x7f00000000c0)) times(&(0x7f0000000080)) 07:33:09 executing program 3: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002bbd7000fddbdf252e00000005002b000100000008000200", @ANYRES32=0x0, @ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00'], 0x3c}, 0x1, 0x0, 0x0, 0x488c1}, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x30) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002bbd7000fddbdf252e00000005002b000100000008000200", @ANYRES32=0x0, @ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00'], 0x3c}, 0x1, 0x0, 0x0, 0x488c1}, 0x8000) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}}}, 0x30) (async) 07:33:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x80, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x2, 0x5, 0xe8b, 0x80000001, 0x20, 0xba, 0x1000, 0x401}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r0, 0x0, 0x2, 0x1, 0x1, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x10, 0x8, 0x7, 0x41}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000580)={&(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x6, 0x4, 0x8, 0x3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f00000005c0)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000400), &(0x7f0000000440)=[0x0, 0x0], 0x6, 0x0, 0xa, 0x0, r4}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x3, 0x0, 0x0) [ 1106.083910][T20423] ------------[ cut here ]------------ [ 1106.089796][T20423] kernel BUG at lib/list_debug.c:62! [ 1106.114469][T20423] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1106.120614][T20423] CPU: 0 PID: 20423 Comm: syz-executor.2 Not tainted 6.4.0-rc6-next-20230616-syzkaller #0 [ 1106.130562][T20423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 1106.140659][T20423] RIP: 0010:__list_del_entry_valid+0x133/0x1b0 [ 1106.146890][T20423] Code: e8 52 d2 4e fd 0f 0b 4c 89 c2 48 c7 c7 80 86 c7 8a e8 41 d2 4e fd 0f 0b 48 89 d1 48 c7 c7 00 87 c7 8a 4c 89 c2 e8 2d d2 4e fd <0f> 0b 48 89 34 24 e8 22 48 be fd 48 8b 34 24 e9 e3 fe ff ff 48 89 [ 1106.166552][T20423] RSP: 0018:ffffc90015c4fd50 EFLAGS: 00010286 [ 1106.172670][T20423] RAX: 000000000000006d RBX: 0000000000000001 RCX: 0000000000000000 07:33:09 executing program 1: times(&(0x7f0000000100)) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0xc, 0x0, 0x0) socketpair(0x15, 0x800, 0x0, &(0x7f0000000000)) times(&(0x7f00000000c0)) [ 1106.180686][T20423] RDX: 0000000000000000 RSI: ffffffff8168d02c RDI: 0000000000000005 [ 1106.188729][T20423] RBP: ffff888079f2b000 R08: 0000000000000005 R09: 0000000000000000 [ 1106.196750][T20423] R10: 0000000080000000 R11: 0000000000000001 R12: ffff888079f2b008 [ 1106.204767][T20423] R13: ffff888023110098 R14: ffff888079f2a000 R15: ffff8880231105f0 [ 1106.213199][T20423] FS: 00005555560be400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 1106.222198][T20423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1106.228838][T20423] CR2: 0000555556a81708 CR3: 0000000013f30000 CR4: 00000000003506f0 [ 1106.236389][T20453] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_cmd_wq": -EINTR [ 1106.236920][T20423] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1106.236942][T20423] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1106.262050][T20423] Call Trace: [ 1106.265449][T20423] [ 1106.268497][T20423] ? die+0x32/0x90 [ 1106.272314][T20423] ? do_trap+0x1b2/0x3f0 [ 1106.276611][T20423] ? __list_del_entry_valid+0x133/0x1b0 [ 1106.282237][T20423] ? __list_del_entry_valid+0x133/0x1b0 [ 1106.287858][T20423] ? do_error_trap+0xb1/0x170 [ 1106.292595][T20423] ? __list_del_entry_valid+0x133/0x1b0 [ 1106.298390][T20423] ? handle_invalid_op+0x2c/0x30 [ 1106.303385][T20423] ? __list_del_entry_valid+0x133/0x1b0 [ 1106.309002][T20423] ? exc_invalid_op+0x2f/0x50 [ 1106.313738][T20423] ? asm_exc_invalid_op+0x1a/0x20 [ 1106.318827][T20423] ? vprintk+0x8c/0xa0 [ 1106.322941][T20423] ? __list_del_entry_valid+0x133/0x1b0 [ 1106.328647][T20423] nfc_llcp_unregister_device+0xb8/0x260 [ 1106.334549][T20423] nfc_unregister_device+0x196/0x330 [ 1106.339897][T20423] ? virtual_nci_open+0x10/0x10 [ 1106.344860][T20423] virtual_ncidev_close+0x52/0xb0 [ 1106.349949][T20423] __fput+0x289/0xac0 [ 1106.353994][T20423] task_work_run+0x16f/0x270 [ 1106.358639][T20423] ? task_work_cancel+0x30/0x30 [ 1106.363548][T20423] exit_to_user_mode_prepare+0x210/0x240 [ 1106.369286][T20423] syscall_exit_to_user_mode+0x1d/0x50 [ 1106.374851][T20423] do_syscall_64+0x46/0xb0 [ 1106.379336][T20423] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1106.385376][T20423] RIP: 0033:0x7fc92123e12b [ 1106.389833][T20423] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1106.409486][T20423] RSP: 002b:00007ffd13d0ebd0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1106.417942][T20423] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fc92123e12b [ 1106.425928][T20423] RDX: 0000000000000000 RSI: 000000000000b0a3 RDI: 0000000000000005 [ 1106.433998][T20423] RBP: 00007fc9213ad980 R08: 0000000000000000 R09: 000000008170a970 [ 1106.441997][T20423] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000010e2da [ 1106.449999][T20423] R13: 00007ffd13d0ecd0 R14: 00007fc9213ac050 R15: 0000000000000032 [ 1106.457994][T20423] [ 1106.461026][T20423] Modules linked in: [ 1106.466394][T20423] ---[ end trace 0000000000000000 ]--- [ 1106.478402][T20423] RIP: 0010:__list_del_entry_valid+0x133/0x1b0 [ 1106.485078][T20423] Code: e8 52 d2 4e fd 0f 0b 4c 89 c2 48 c7 c7 80 86 c7 8a e8 41 d2 4e fd 0f 0b 48 89 d1 48 c7 c7 00 87 c7 8a 4c 89 c2 e8 2d d2 4e fd <0f> 0b 48 89 34 24 e8 22 48 be fd 48 8b 34 24 e9 e3 fe ff ff 48 89 [ 1106.505170][T20423] RSP: 0018:ffffc90015c4fd50 EFLAGS: 00010286 [ 1106.511917][T20423] RAX: 000000000000006d RBX: 0000000000000001 RCX: 0000000000000000 [ 1106.521146][T20423] RDX: 0000000000000000 RSI: ffffffff8168d02c RDI: 0000000000000005 [ 1106.530324][T20423] RBP: ffff888079f2b000 R08: 0000000000000005 R09: 0000000000000000 [ 1106.538388][T20423] R10: 0000000080000000 R11: 0000000000000001 R12: ffff888079f2b008 [ 1106.547187][T20423] R13: ffff888023110098 R14: ffff888079f2a000 R15: ffff8880231105f0 [ 1106.555473][T20423] FS: 00005555560be400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 1106.564548][T20423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1106.571753][T20423] CR2: 00007fcc68b831b8 CR3: 0000000013f30000 CR4: 00000000003506f0 [ 1106.580035][T20423] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1106.588156][T20423] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1106.596232][T20423] Kernel panic - not syncing: Fatal exception [ 1106.602588][T20423] Kernel Offset: disabled [ 1106.607012][T20423] Rebooting in 86400 seconds..