$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = socket(0x1a, 0x6, 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r6, 0x40, 0x80000}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) socket(0x15, 0x1, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:23 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) 08:33:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0xf43, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 08:33:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = socket(0x1a, 0x6, 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r6, 0x40, 0x80000}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) socket(0x15, 0x1, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x292100, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0xb9, &(0x7f0000000640)=[{&(0x7f0000000040)=""/159, 0x9f}], 0x1, &(0x7f0000000680)=""/47, 0x2f}, 0x1) setsockopt$inet6_tcp_int(r0, 0x2, 0x8, 0x0, 0xffffffffffffff3c) 08:33:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept$netrom(r0, &(0x7f0000000140)={{0x3, @default}, [@rose, @remote, @rose, @null, @bcast, @remote, @null]}, &(0x7f00000001c0)=0x48) bind$netrom(r1, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast, @null, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9cd9, 0x4) accept4$netrom(r0, 0x0, &(0x7f0000000100), 0x80000) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) 08:33:23 executing program 4: io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x63c200, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000040)=0xb4eb, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, &(0x7f00000000c0)) 08:33:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0xf43, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 08:33:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r5, 0x40, 0x80000}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) socket(0x15, 0x1, 0x6) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x40100, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$netrom(r2, &(0x7f00000000c0)={{}, [@remote, @default, @rose, @bcast, @null, @null, @null, @null]}, &(0x7f0000000140)=0x48, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b218355", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:23 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x80304d65, &(0x7f0000000000)) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1000}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x81}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = eventfd(0x10001) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xb, 0x2, r1, &(0x7f00000001c0)="5fdb29d906304407598c6831cf8f40c64d2971cb938f1c5b2359bb514ff6293e51dfaa8cad47c36bd9e38b5f9e8bb1b34d39", 0x32, 0x7, 0x0, 0x1, r2}, &(0x7f0000000240)) 08:33:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0xf43, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 08:33:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) connect$vsock_stream(r0, &(0x7f0000000100), 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x400040, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x1, 0x1, 'client1\x00', 0x7, "e3d1aafbd88c9634", "02ca40df7bad8dbece34200a91b9e79d539376941524cc2699675e0ff3c86055", 0x0, 0x7}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b218355", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r5, 0x40, 0x80000}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0xf43, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 08:33:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/200, 0xc8, 0x0, &(0x7f0000000100)=""/118, 0x76}, &(0x7f00000001c0)=0x40) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000200)=0x9) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x7, 0x1, 'client0\x00', 0x2, "3122f3a0582111a7", "21b9883e7ed8aa1c19410f2b47cf40b10a86efaac500a50f913cfb64f5fb98be", 0x0, 0x3}) 08:33:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x10) 08:33:24 executing program 4: socket(0xf, 0x800, 0x5) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:33:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b218355", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 08:33:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) connect$pptp(r1, &(0x7f0000000640)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) 08:33:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000140)={0x0, 0x3, r4, 0x40, 0x80000}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000080)={r3, 0x1, 0x2000, 0x10000}) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f00000000c0)="edfbad8764b3597111d234be1225fdab98f324d8da0373f3ff75d94979fbff5d5e730f2f09e7df78fb22b49b33887c0ff2e73aadf52800dc0d8549bd9f4dbb1060f53621656fc1aab610ef926b1ec2225889d671353dd77682bf20a811fe18a8111c8ef9af7a9c21a50a01a8a728d111327a98126294426df8a01fc767fa2da1e8e5f7001257f918678449280ac2d1273204f3e124d8647bd2baae961602389f304ec604fcda361129d42e01f2901bc9d410b9109c30c63cd769de767d495bbededb41b5438fa4a66d", &(0x7f00000001c0)=@udp6=r5, 0x4}, 0xff95) 08:33:24 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) 08:33:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b43", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)) 08:33:24 executing program 5: socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "f9cb28aa8dded75f", "3c2d1cbf8866199d436e746c8febe307", "8298d443", "c5326060cdc63526"}, 0x28) 08:33:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 08:33:24 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) 08:33:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b43", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:24 executing program 3: syz_usb_connect$hid(0x4, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb8c, 0x92, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x7, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x80}}}}}]}}]}}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000140)=@string={0x0, 0x3, "272bdb3afcf795bc617c2d997071b3e901fd9372fd77c25dc2772f0aad17d77e66d6c937c6b822eb563c75ab36bd88331d8427a66ee7e918eb79ac"}}, {0x4, &(0x7f0000000040)=@string={0x0, 0x3, "f99efd4a6cf646dbeb798bb463afb34a1e7a45d32afd5782c9f6a046cc18ec39e0e62af8dc09fc75bb723b20391be0de1187dea20dce63b2a292257fc0845bf93ba91b8f9dae9bce8f781814fc1504cd44368f3bc7a064728210254fb9170a4cc4987ac1d6a1ffef055aac4f8302814f164e805bbdd8d813b6ca68fc6bf3ea692c6413c31bd59e3c6fd33314fcec3fdeb159377cd6826e50d7c074ef7cf2e0517ed0e571098f725a18d6e4d764960711fb249fb11778"}}]}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd2a, 0x5dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x49041}, 0x4000010) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000700)={'sit0\x00', &(0x7f0000000640)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x6, 0x5, 0x40, @local, @ipv4={'\x00', '\xff\xff', @local}, 0x8020, 0x40, 0x200, 0x6}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x3, 0x8, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x3b, &(0x7f0000000600)=""/59, 0x40f00, 0x4, '\x00', r1, 0x18, r2, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x5, 0x80, 0xc78}, 0x10, 0x21ae0, r0}, 0x78) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000400)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x503003, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10d482, 0x0) getsockname(r3, &(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x80) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000003c0)=@ccm_128={{0x505}, "8cf62d7c280950f7", "1a1b3f7f5e70eacd21960c35f846428b", "a81d47b0", "68063504a8daa13d"}, 0x28) sendto$netrom(r4, &(0x7f0000000300)="686821062bfe4c97ffa1c9a13cdcda2b40581015aa8e1a281d50819d5eb45fb84090f69037f55f39a7c12155efd8ec329d7e8999215103", 0x37, 0x20000000, &(0x7f0000000340)={{0x3, @default, 0x3}, [@null, @default, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x401, r0, &(0x7f0000000080)="29dc02dc608ffbd366e3c5949d5e74358a3811dc3a8bc364bf9eb54840211b1e66918b68d5692e607ad8214f48af5c2c7dce5daf1a953d282f9a8350ebfcc162cb7e4946579eb680c8b850eb494c8f7c4ad7cbd2045697f5150a38c4dee912cba29e3666d10707d7e57e1b6d9692d98a5513b4b06947da453507783b238ae41b655ec54f97", 0x85, 0x5cc9, 0x0, 0x1, r0}, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000480)={0x3, 0x2, 'client0\x00', 0xffffffff80000000, "8880220e02084d16", "4c7fd0b64bed4a99e1c92750823be8628fbf18c60ac080dcf3e7db85709edcc4", 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b43", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:24 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) 08:33:25 executing program 5: getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @rose}, [@remote, @rose, @remote, @rose, @remote, @default, @bcast]}, &(0x7f0000000080)=0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x480001, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d16, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140), 0x4) 08:33:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9b", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:25 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)) 08:33:25 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) socket(0x29, 0x3, 0xff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0xb) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) sendmsg$SMC_PNETID_ADD(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syz_tun\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg2\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4008000}, 0x14) 08:33:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getrule={0x14, 0x22, 0x8, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x5, 0x1, 0x40, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x7, 0x0, 0x400}}) 08:33:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) 08:33:25 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000700)={'sit0\x00', &(0x7f0000000640)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x6, 0x5, 0x40, @local, @ipv4={'\x00', '\xff\xff', @local}, 0x8020, 0x40, 0x200, 0x6}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x3, 0x8, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x3b, &(0x7f0000000600)=""/59, 0x40f00, 0x4, '\x00', r1, 0x18, r2, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x5, 0x80, 0xc78}, 0x10, 0x21ae0, r0}, 0x78) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000400)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x503003, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10d482, 0x0) getsockname(r3, &(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x80) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000003c0)=@ccm_128={{0x505}, "8cf62d7c280950f7", "1a1b3f7f5e70eacd21960c35f846428b", "a81d47b0", "68063504a8daa13d"}, 0x28) sendto$netrom(r4, &(0x7f0000000300)="686821062bfe4c97ffa1c9a13cdcda2b40581015aa8e1a281d50819d5eb45fb84090f69037f55f39a7c12155efd8ec329d7e8999215103", 0x37, 0x20000000, &(0x7f0000000340)={{0x3, @default, 0x3}, [@null, @default, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x401, r0, &(0x7f0000000080)="29dc02dc608ffbd366e3c5949d5e74358a3811dc3a8bc364bf9eb54840211b1e66918b68d5692e607ad8214f48af5c2c7dce5daf1a953d282f9a8350ebfcc162cb7e4946579eb680c8b850eb494c8f7c4ad7cbd2045697f5150a38c4dee912cba29e3666d10707d7e57e1b6d9692d98a5513b4b06947da453507783b238ae41b655ec54f97", 0x85, 0x5cc9, 0x0, 0x1, r0}, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000480)={0x3, 0x2, 'client0\x00', 0xffffffff80000000, "8880220e02084d16", "4c7fd0b64bed4a99e1c92750823be8628fbf18c60ac080dcf3e7db85709edcc4", 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9b", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 08:33:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 08:33:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9b", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:25 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000429bd70eefedbdf25030001000000060001004e22000008000800e0000001050004000000000006000a004e220000"], 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x20000080) 08:33:25 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x8, r0, &(0x7f0000000000)="ae82c29b0089dfc1f9a484448ae49e9387dc0e2f2d27593d00adcceb36c87b5f868c22714f1d2ada2022be6f751ed6f0d0e3071144fef3634ffc5cb5125b5925df3f963f24d2c953dfb7a7213b4f852ed123cdaa54337c9358725235a22d681ec03b35698c12f21b42b80f3a018b676aa35db03915eefb99898668314b2c172904d33894e7c216da0fdda9965c10a63a8cdab188f1a0c53b46494d8883be73c7c84a0dcb6a87f35621a1327fcecee78d", 0xb0, 0x8, 0x0, 0x2}, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) socket(0x1a, 0x6, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:25 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)) 08:33:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:33:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be379", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000040)='/dev/loop-control\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x385200, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303}, "12bc7be9ba5257a9", "8ef1e5cfc8f9737c2677eaf99479c0be", "1cf08db8", "0f36e99380e6a43a"}, 0x28) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x2, @remote}}, 0x1e) 08:33:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/19, 0x13, 0x1, &(0x7f0000000040)=""/171, 0xab}, &(0x7f0000000140)=0x40) setsockopt$inet6_tcp_int(r0, 0x2, 0x5, 0x0, 0x0) 08:33:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:25 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)) 08:33:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be379", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x521820, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) 08:33:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x80000000, 0x4) 08:33:26 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000100)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_setup(0x81, &(0x7f0000000080)={0x0, 0x74d3, 0x2, 0x3, 0x11}) 08:33:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)) 08:33:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be379", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3", 0x4}, 0x20) 08:33:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x510d80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x400201, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), r2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080), 0x4) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 08:33:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x2, 0x6, 0x0, 0x0) r1 = socket(0x27, 0x800, 0x1) syz_genetlink_get_family_id$smc(&(0x7f0000000000), r1) 08:33:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:26 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/uts\x00') openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0xa) 08:33:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", 0x0, 0x4}, 0x20) 08:33:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 08:33:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 08:33:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", 0x0, 0x4}, 0x20) 08:33:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(0xffffffffffffffff, 0x80044dfe, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 08:33:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x104001, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) io_uring_setup(0xaa, &(0x7f0000000080)={0x0, 0x864c, 0x10, 0x3, 0x299, 0x0, r1}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:26 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x2f, 0x40, 0x75, 0x4, 0x8, @private1, @mcast1, 0x8000, 0x720, 0x7, 0x12}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRES16=r1, @ANYBLOB="020026bd7000fddbdf2502000000080008000000000008000b00", @ANYRES32=r0, @ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20008050) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001640)={0x28, 0x0, 0x2710, @local}, 0x10, 0x0) accept4$vsock_stream(r3, &(0x7f0000001680)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) setsockopt$inet6_tcp_int(r2, 0x2, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 08:33:26 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", 0x0, 0x4}, 0x20) 08:33:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xe880, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000001c0)=0x1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000040)={{0x20, 0xf9}, {0x0, 0xfa}, 0x80000000, 0x5, 0x8}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f00000000c0)={0x40}) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{0x303}, "4d1e60e6882a2fb1", "662721c1629df8f84197e6a06cb67045", "8ecbd655", "54b114706e080303"}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x9, 0x0, 0x81, 0x8, @empty, @private0, 0x80, 0x8, 0x0, 0x10001}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SOUND_MIXER_INFO(r1, 0x805c4d65, &(0x7f0000000100)) 08:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) 08:33:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000180)=@ccm_128={{0x304}, "d1bc9f39804be0fb", "d38a2d555fac2a7e49363c8595360827", "88d3b623", "55fc806608fcdfed"}, 0x28) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f00000001c0)="708dd6b1144a61565751dd50a146bc739f702b126d653c069bf47ae2f4433bcc2496d34387ab22818692c58cf03a0d48cba18f4b04d7f9aadfed8c0f43d09e129172c9934f133e08f7d81283a35c999b18545bef8de5277e851d37e6aaf12b2acbbe8f02f848bf89b7eb914d459b80fb1fa46885cbfa0e3fca88d509c6f0100f4e16a1231e61454d57d340db227d530b00009a4eaf99c2d5cdf9bd20f6fea127061add9cffc739e2a70fe43a50b427d00df73cf4c0ce1c92fedac3511dd63e0664765e87c9cb1c6173c1453ac08ea95c1f8b0caaec03366340a75ef7bad83c97001ee3252800c8123888a35cddfb69a04e75f94c818d6a164db48aa1cc15f59184e372e8890be6314a70b7105bb332e201050e037c42ca443854cdc9fcbb330f354ae7464f3cc4e2e92b2d5fe8060b7667a0510e88b9523d56505a8f2f980d34716407f6c3bbf0b1ed7ddca6cbc1968c85cfc414bcc3", 0x156) 08:33:27 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x50002, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100), 0x4}, 0x20) 08:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 08:33:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040004}, 0x14) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:27 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10001, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x9, 0x0, 0xffffffffffffff8c) 08:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100), 0x4}, 0x20) 08:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 08:33:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 08:33:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:27 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x3) accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@netrom, @null, @null, @netrom, @rose, @null, @null, @null]}, &(0x7f0000000100)=0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100), 0x4}, 0x20) 08:33:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) 08:33:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10640, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:27 executing program 5: accept$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default}, [@rose, @netrom, @default, @null, @netrom, @null, @remote, @rose]}, &(0x7f0000000080)=0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c", 0x4}, 0x20) 08:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x700, 0x0) 08:33:28 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 08:33:28 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x28cf80, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@getlink={0x16c, 0x12, 0x1, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x4122, 0x1}, [@IFLA_AF_SPEC={0x3c, 0x1a, 0x0, 0x1, [@AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x13, 0x0, 0x0, 0x3}, {0x8, 0x16, 0x0, 0x0, 0x3}, {0x8, 0x2, 0x0, 0x0, 0x4}, {0x8, 0x17, 0x0, 0x0, 0x10001}]}}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_MPLS={0x4}]}, @IFLA_EXT_MASK={0x8}, @IFLA_PROTO_DOWN={0x5}, @IFLA_EXT_MASK={0x8, 0x1d, 0xfffff8d6}, @IFLA_VFINFO_LIST={0xe4, 0x16, 0x0, 0x1, [{0xe0, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xbfae, @broadcast}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x8, 0x401}}, @IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x9, 0xf89, 0x8, 0x8100}}, {0x14, 0x1, {0x1, 0x1a5, 0x140}}, {0x14, 0x1, {0x5, 0xc12, 0x3f}}, {0x14, 0x1, {0x7f, 0x34, 0xa5b, 0x8100}}, {0x14, 0x1, {0x7ff, 0x39, 0x3, 0x8100}}, {0x14, 0x1, {0x7f, 0x499, 0xc6, 0xef13ecde27bd75a4}}, {0x14, 0x1, {0x4, 0x81, 0x3f, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xdd, 0xbb3}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xffff, 0x200}}]}]}, @IFLA_ALT_IFNAME={0x14, 0x35, 'veth0_macvtap\x00'}]}, 0x16c}, 0x1, 0x0, 0x0, 0x8001}, 0x8080) 08:33:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x6861, 0x4) 08:33:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/73, 0x49, 0x0, &(0x7f0000000080)=""/207, 0xcf}, &(0x7f00000001c0)=0x40) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(0xffffffffffffffff, 0x80044d76, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) 08:33:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1600, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x2f, 0x81, 0x40, 0x6, 0x16, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x80, 0x7800, 0x0, 0x1}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x151543, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x40, 0xffffffff, 0x8, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x700, 0x8, 0xfffffffd, 0x8}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnetconf={0x24, 0x52, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000008) 08:33:28 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c", 0x4}, 0x20) 08:33:28 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x105000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x73c}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfffa}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080}, 0x804) 08:33:28 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x6861, 0x4) 08:33:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x4, 0x0, 0x18) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000001640), 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) 08:33:28 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c", 0x4}, 0x20) 08:33:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x58d300, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(r3, &(0x7f0000000040)=@caif=@dgm, &(0x7f00000000c0)=0x80) 08:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x6861, 0x4) 08:33:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(r1, &(0x7f0000000040)=@xdp, &(0x7f0000000000)=0x80) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @bcast, 0x7, 0x5, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 08:33:28 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a8", 0x4}, 0x20) 08:33:28 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x2f, 0x8, 0x0, 0x7, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x40, 0xfff, 0x80000001}}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180)="b5c86fdfb5efa8aa1bd043cd951c3e7ff88487060546fed9b82642a36489a7643c3a0b98e68eee809f080145d4a3aca9fa91842f4cf297338ce533464c3c26486f4dee20ffc192dd8b44fa468919c60fc8223509c06e062c849f8eb54844ed461f434a19", &(0x7f0000000200)=@udp=r1, 0x1}, 0x20) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 08:33:28 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x6861, 0x4) 08:33:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/147, 0x93, 0x100, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@netrom, @default, @bcast, @bcast, @bcast, @remote, @null, @null]}, &(0x7f00000002c0)=0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000380)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x3, 0x5, 0x0, @empty, @mcast2, 0x8, 0x7, 0x6, 0x7}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001100080029bd7000fbdbdf2507000000c50620c1b1f0fb1eb533f366e04b12bd33d38ba1b6d34839f746e87724c024a1", @ANYRES32=r3, @ANYBLOB="000000000000000014002b80080003000200000008000800", @ANYRES32=r4, @ANYBLOB="08002e0002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8050}, 0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:33:28 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x402881, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r1, 0x2, 0x2, 0x0, 0x0) 08:33:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = eventfd(0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x8, r2, &(0x7f0000000140)="d391fae3410aeb1239904798009cf3eea45ff9d147824d1e053abc646dfc6c2dabdc8cac1ff3f221c58371afd7e3867fdb4c8015e486b541f1f28b53be70919bea5a9dd737c8266704c76011f1aac3ab8e2ea3f8fd98ee55e550130cb6f7aa713e61fc52bed87de7aa11c1cb75e0c2c8dc0881d07ff32078682ac023d6ac0f9d49c00ff082484b3223e001274fdbdd1bfb3160bb3788c16130476c5ac14db27815d3c2b096cb30e764", 0xa9, 0x1, 0x0, 0x2, r1}, &(0x7f0000000100)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:33:28 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a8", 0x4}, 0x20) 08:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, 0x0) 08:33:28 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x2) 08:33:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000040)={{}, [@remote, @netrom, @rose, @remote, @bcast, @bcast, @remote, @rose]}, &(0x7f00000000c0)=0x48, 0x1000) getsockname(r1, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000001c0)=0x1ff, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) 08:33:29 executing program 3: io_setup(0x8, &(0x7f0000000040)) io_setup(0x7f, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x40000000000002, 0x1, &(0x7f0000000080)=[{}], &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x1ff]}, 0x8}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a8", 0x4}, 0x20) 08:33:29 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) 08:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, 0x0) 08:33:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c", 0x4}, 0x20) 08:33:29 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:29 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) 08:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, 0x0) 08:33:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000040)="f14447675b188a4a2ff55ead174b0bf75a5eb709a725108e21c3f68a5145482b302ad8f514543ab1f2cf282aedab4853a63565659d13aad52bcbc02a202d8ad32539af4d81e655085b74ce42bdc85f1207d685db0528d104782046711d", 0x5d) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c", 0x4}, 0x20) 08:33:29 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) 08:33:29 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x29, 0x4, 0xa8, 0x1, 0x15, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x8000, 0x80, 0xffff, 0x3ff}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3000f1ff1700000228bd5000fca500003100000c00091006000001000000000000000000", @ANYRES32=r1, @ANYBLOB="083884ae1d0449db"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0xc0) 08:33:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c", 0x4}, 0x20) 08:33:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200600, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{}, [@bcast, @null, @remote, @rose, @default, @netrom, @bcast, @netrom]}, &(0x7f0000000000)=0x48, 0x0) 08:33:29 executing program 5: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x1b, 0x3, 0x9) setsockopt$inet6_tcp_int(r0, 0x2, 0x10, 0x0, 0x26) 08:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100), 0x4) 08:33:29 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12f", 0x4}, 0x20) 08:33:29 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000080), 0x8) 08:33:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001540)) 08:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100), 0x4) 08:33:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12f", 0x4}, 0x20) 08:33:30 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:33:30 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002280), 0x400000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002200)={&(0x7f00000021c0)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002240)={&(0x7f0000000040)="4b9d791f30b4996a1b72e87e65cafbe0dc0c9e6fccd17d02900a3c2bfaad2234a19c2384f3126699d4c64d2f75f804bd1161e6bd30213bc9570a5436237bc6bd30ce2374d139f59df4a0c5fc86f114b6dfd92fb2ee656e7c333cad96355ae7f5a67752139dbc3fb00b4d6d9cfe6ad5d0cb0e39d57b77d990f30d6f8796b31afe145a7ed277f6a598bf16bc7d277e2592bfdd2c91fcf2e4ec63952404bc6a19b555d2c0398db576ec7bdf39ccfff5e909cc4ba10aa9ca37da205b1b6ab8923cd4fa357710c0a7", &(0x7f0000000140)=""/106, &(0x7f00000001c0)="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", &(0x7f00000011c0)="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", 0x7f, r1}, 0x38) 08:33:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100), 0x4) 08:33:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12f", 0x4}, 0x20) 08:33:30 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:30 executing program 5: getrusage(0x1, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x2f, 0xe7, 0x6, 0x8, 0x40, @local, @local, 0x80, 0x40, 0xb7, 0x5}}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES64=r0, @ANYBLOB="04000bbe7000fedbdd2503000000060001004e2200000500030011000041e50072d80f1f140200000008000b00"/58, @ANYRESDEC, @ANYRESDEC=r1], 0x50}}, 0x4000040) connect$netlink(0xffffffffffffffff, &(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) 08:33:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001540)) 08:33:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31", 0x4}, 0x20) 08:33:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x329080, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080), 0x70d240, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000200000000000006001b000000000005"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x2, 0x0, 0x0, 0x0) 08:33:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={r3, 0x1, 0xffffffffffffffff, 0x2, 0x80000}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r1, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31", 0x4}, 0x20) 08:33:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001540)) 08:33:30 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000040), 0x0, 0x2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) 08:33:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x17, 0x0, "5d68e77192f91b47cfeab9975e1a80a99a48f0055bdf79f025a64ef2921299abbdb21a4e6e7dce8aaffdc24e0fd8ca040fb5a5739872e65f8874370ef08aeadfef3f492270fa4c07b3100920f5006364"}, 0xd8) 08:33:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31", 0x4}, 0x20) 08:33:30 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001540)) 08:33:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x200001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x4, 0x63abdca4, 0x5, {0x9, 0x1}, 0xb49f, 0x7}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) timerfd_gettime(r2, &(0x7f0000000100)) 08:33:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200040, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:31 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) 08:33:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 08:33:31 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3"}, 0x20) 08:33:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x9, 0x4) 08:33:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_destroy(r1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) 08:33:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) socket$inet6_udplite(0xa, 0x2, 0x88) 08:33:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x30, r3, 0x800, 0x30bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x4040044) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x5, 0x4) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x10000, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 08:33:31 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3"}, 0x20) 08:33:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x18, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 08:33:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x9, 0x4) 08:33:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x101400, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:31 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="5f541d97dca94286b4a6e702f2d16ea82b19bc05111cdda2935d01c0235bd9aa929463fbc14a5d1bcfad3c3e2366b0722c57e4dff7b480af76522a1bbdf6b7543385bf3127b6c1747ae6ae1f730e21fb23d8b3b5af0412f958f97f9dff5cf4fe6e06f89d03db93383b2183553aa34a3a0a119b4354002e9be37910", &(0x7f0000000100)=@buf="3ec6b659b6db83fbd8c787bcbf0ae5743373d8e0d10f8b82eef63c3a003187466b8536f23ada04a857ba3436f9a90c1cc12fad31e3"}, 0x20) 08:33:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000000)) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:31 executing program 3: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x12943, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(r1, 0x5, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, &(0x7f0000000100), 0x0, 0x9, 0x0, 0x1}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xfff8, r0, &(0x7f0000000180)="68c475114fc4062c1279b2a226db7a", 0xf, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x81, r3, &(0x7f0000000200)="68042a60cd11bb739c10189cb9291d4354c4e914c6427dd444bcf55a754ceb458c59d7c9f288dea01ff61f0d70389847ed1eda9c888868d5d77b4a2d211b822e5628c9ceff9c145560d05e809c9043517ce6f2f740ee1ed183b6d911cc6fc48c4603f07e9188e9234bfccb65fdb01936ba34f706124934b8acaa3750a2fc11ae35c1b14d0eab9f1088a2f4ee98a1f65f37f2be29dfb1fb5cb86a56ef5b103e9e65a3c28f4a12c69d5b5cb74497e43bcf214fe0ecc6b3e1e648cbcfa0fab339301e02ca8d28c537ae43f6983c820d08b8a0", 0xd1, 0x1, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x8, r4, &(0x7f0000000340)="2b9566700c86cea3883d4612b3345cc52679c569dca808fe8fdf071f97aea9f5449b8c3368e459a9906082e638c626c96d2056fe72954a03f1a3491e63c6c67898013a96f595a5bbcfa92c2ede349d7dcb0bc1969b55609192355fd055214c5f949e759ea72365b2da", 0x69, 0x0, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x7f, r0, &(0x7f0000000400)="e52f836cd1ee175e66385847446682bd79acc3cc11b072", 0x17, 0x3fe00000000000, 0x0, 0x4}]) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x2) 08:33:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r1, 0x0, 0xfffffffffffff000, 0x8000}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) 08:33:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x9, 0x4) 08:33:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:31 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x68}}, 0x0, 0x0, 0x11, 0x0, "e7c9f5c525f89c43306d9dc5a8ba1a63801a790ef96f5d3477fa6b8949c9b7071ea44bcc9cb211bd3ddee792e75cee644f15e52f4e86a46fe19738503d88708aac9f1f1976378a1ec8665a25fb2b51d2"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 08:33:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f00000000c0)="60d2d4658cba6e109c698b6acf50c7d0101395244a9f609e33d0db506e8e710ee99d568903e7b7cd1986748758f4566cedc685103c0e5e90bfb16e5959e88d9d7e32d73201d0e07508ffe99ea531bdf0d5df7418399abc4c01aff67e747e38903f72636e4c4ced8d6b04173b244adacad99ca0080cc8a145b465c98c5c5e2ac9635faa3ca6ba8b649db303605b01b6829b0c7ea10cd9e02648110b4a2896bb60e869e7eb9541cddfeeb076b669d92a60ea382a1db26acef8947484604fce0523753f23935fd176fbf19ee1903085d8de42f6a27285760b6e5917d646507777f2da4dc81d56f963c9ec31edab1d3f46d521221489ce142a584fa2fc548e67d835cd3f5b7ff32d70741c156289dfa3c4254f3212eb722acdf340c300bf7084bcd3b05c04840bf0b241caa765828f41770f83a8df4686fb9815ee63eab5fa808152d6a861905a062fef7787964dee593a94614c6720118e526cb556c35315e4d1a0c6fb21ffeefcd111628b20b687dda5b8fde65f4394d851dda34c0072e5ed7aff8bf6fa5e67e2ba1a657ecd70ebb3067c68e57945b7e291b1b2b5ab4c2bf27eed2f820533ca85d57fe5edb32efe4938dec5d7f7244cd4744c0334495ed2638b2c08da85af8d766a7ade960c2ac804d66f3ff939f1f891e81594fd7b4f2cd030089430ce16409f6146654000aac5cce502bbf9a347041fee28efe5ce30dc8bdd0c7edc3d780ae88e3952be0031cb89d2617f97f7629d97783c11cf2620c7bd8a570dac21773a8710fc41c7676fa107bc0c1039cd8f31ab0fcbb70132834bf69c9c0baef9b25fcba14438ff12a4b64a288a6226ea5955f3a42adbb6cc43ef28379a6636b1f4db7f9fefd541c092a3ddb5e1b35c206b9f4e9a05e23edb8e45f8eb8f555370632a4ba56a6417d458663c5a67c51106376cc6737acbd4d82758795185ae3f187b15975799b09c53517de9e354cca39b3ecd87d2d72edb6b28ac37d97751284643713a61df501a6f6ea9ad2e65c9a8e292782fbb1ee0a8236988f2ce39ceea36dfab83f685c8975dd751e253cb1513d1daf020c5a958718a2941812dce6ba3e53989d1ffddd9669b380a06ecc745a8faefe3d8e122add71f4fffd0ac48a1a22a5633149269dbf26057a59f9ccc4eaf1ea7ee46f66914180eb8e718fa9659d95624899475fcfda4ad50c292cbbdbf2038c7c68a24f0e73453a10b8f80f6c9bda5dd86c567c13f3d3face6b44d87cd7821241ea972e0b2d601311660b1653eb8e02c5b519065ad47c16bd0bd086f373599f65ec26194ce4fcdced9e88e311026a2613e9cb6ea016222c681930db3d21660290968040df073ef69354f89a950eea3893b9f9835624f92f30552efd75eb16bdb1bc218042c508c555c23acb95bc4074a743349219dae190f1d8f6e361f4830edc23c35a93a74e388c9d0cf824e1b469c60c6a0ab970c9f88727960f2a663c7320dfd1d021122c56e9b9533f4a2ca5887664d52bfb9ba01e754d540ec42db9422e81b29266656428c28d6a831fd1cc65e464f8c5ca914c2d485cd1bb690fd205a4477bd65e1cbd589dc9f9f499afc9942b055c376afe7661f2adef0ff8dc01f4374fe027990665d066a710b5a33eef05cab2fa5b4a71a46a238d36cc29e0c4811d76b1c4867e0ca0c616c59131e30e7f9c2ff069994e1f384180172f057fa7ff754e2c691a1cea611eeb82d73e9840b3ba9a957d94fb0059347ea313c05705942d8d5a57b733eded8ebf1e1452bce149627c12d7c1c00a9f391b68b72ca62fb7310e7ad15f675d571896e151d7537c345841ad6e5458ec56171ac249c26e9591423329dcf8702344cc04bf1b11aeca6386c6edd6e1c80906e1bcafbfd9d855cd0b6226c3368dc238ad9220f0fd778ba3fa6dfa1f1bdc42e936e7ba1bd45cff7b77f0cf9e5cd333e0455b29b87597637a92c435596cb7c03df90c867e4f294eb7c1a9178704dce3765efd62792a2b81753580767dd6bf1bd03a6063e590a5295dfa2a298baccb6d22dbb3369c69bf430d1a64d671aed14308d9f2d2a183456f7ae83e7f0edcee882ff1399f73baefdd806bdbca306cfe17a8dc63c40fbec0aa829e41c890ab050e21bf3f84f70f5e69cb593693b52c234a9ae95f460187ac4c572588856fbcbeacf82dc20e79b986dc33910c7d2af78193b56059622e834d561cdae8827c75835f7fab0fa56748ac97294b4bc67ff1e1af53a9eaf234f6286c8c2fa847309bea9d6ed91c88356c1a4cfd103004309e181eb411a48582e5707667d7cdb88db66a04cf7633efdefd88b6b587d20b790f16cbcb07eb5a441ea20a844a74a4566b991ea9f75c3bd09af4a1c51ca6d51312b4fb58b3b30c3696d36db006e812dce34ae7de5d94e383b76d1b1db2f2fff41cf8f8a57fad6eafac4bc4f744964b249e5c29e0c2d3e76c415cd98a703465d9fd43407acde049885fccd414d05bf35346c2de8e5fed19773e9dd6654598ad03125f6f21bee60baee7c3df77421b0b1a2328d410a1bef077e4861be88715f22ebddbf6ee7844e113f961864181cd758737d1f2a2a0f320a0b6c3f110b76056277785ec93ee5e2375ce5e40b4b6a5937da3efcf3e12b7ff54e1d771cef832801900a689d67a31c3a4eb8bd18e0b8b0163a7eb6f374b02f66ce661a4deb9753c1ce6a2b02bea488db23d832a08f8a1bef3f9325b87dfc6f67bf2e905915b284b862e74aff066970c05b8e0c1bd37437a0b90d4eda8fad4a3f9ae2287682df0f73eb926241ec617b0c7d0a6e8831e72914cc750d93e009965d4371fb667bb89efa7ec5e9a22ed594236959004ab3397bb7ab6e0c9af78306973b3d132199546c9da1252a308eec3c2ba1c57fbd08f6f1449ce7f823ad4e582756e2ac0e9ec289ca9fb7631ae03745073bd54010416f614df1d35fbe82817b8abf3c6f1f21d4c0de2754f8acf0664f2df7151569f527001012c75a7abd3735522d42829a9fb4a6abf90fe7ab88d58c986f13e3e97577da24cc7ad9ea79888bb8d2bb7cf729a78a5f8e53ba0df80bd2179aa3c7e7fb74bf1a1a036226b3b9fafd66ed4bc7544bf21a0d598860572d1fbeca46f6525499268d770cbd3790ceedc782ff5edd1ed3b740813bf98ff4d8057896a149a5f35d67ebd98cdf5aa52a5e6be40976c706519fb9053932bd1196aed84764193f0dc6fd04b40fb08817f2929ed3b4755214218bade2fb2497d527466f047218138f1a823bd24fa2100add2478a272765bec38f632142c72501e843953eb123221580274d2b0625570471eae0a1c096de81388cd012225db0b9d861901868c7dbc24e10af44a543dddaac2fdc317d57c69c27ff7323609ba75691df123ce6a3af7bb4f6648de8750f2c677dd0be0d1d16b5bd49ac5018be9c16ec799ca4eeb2094130000feddad7ee41d2a16dd84dab4d25e01d7369378cca00b95f157e24bf99632ad82cc580a4d6a8bd6226ddc4162e6d67c9ab697dfa925daad093c7f3f183f96cee9f2bf382e6d40243ed4dfb0ee343d471f3555048e9efe2e06824416a905512140df4d2bf2afb981fd6e07d8bd2ef2927e60ebfe0eb7f288b2ed2ddfcf48c64bc145bb31d5b3442066e0522de99bf39f8e6dcd34918f7186e9a28211fba743154cc2a821bf5259b4e17cc4e679aed9f6fdf29899048445dc4218631d5321228f40786f2ebfd28ea31d553e9aae1611907eac1a7585cbcae7ee9f8896928560b3c4941a2e2d68c4c24447067a79d9b9451a05ff42a2312a0c7f19e021e113dabd218b98604a6b42ea525806bd0a4269d4df2853d6596f4b6d580ef39943aafa5e11eafeedf389d841e71e9964e5984bd8597cdc40b5d53f186e9180bf2ad75db0a0673070c922ad6565dcf8fc3642e6212e784579462679123bd977a698eaa9fc623939b72b4157f92b6c7090defd51433b4e39d68b49dcd940c7b4fe2b11c8181ff66ca9369f86df4f34ed8bbded1c7e8c4380b4c1ca8b4a98fd829cd3dcf85a8b68faad8f37bad0f1ceabf9d801f9e2cf52fcdadfd1e8088c29e0de268674d7fbb10149221c76d87b15cdd9706842ad3d227494c595fad41322c757ae3e3193cc50fbbd8590a9ee5f9112fff17ebd56e6d9c08c7e4becfd162f5a399cd1db2d17cb6855b3ea50d9169c224e0af59ca7be43b1736ce7f15cebd9e5847a2e2374c8297c90b40431493070e36f03052af19147f3b8625ca7c964b588d45ca1e8b12038032d327c4d1c234f63522a85acf876a2f2193138ea4630b4c718904a43e71f0c25c45e64518fefc0b32c79f6eb8033f5b1055836d648500db7692610abd310945886401720fe461c0916e4018e63cfb7d515ce114c8f1bcf7306cb53bc06714c7cae2101eeca1e78ad70d010241790e16d884b8e65c05235e554fe2a2239c21c7eee8a9952e67693019e0c1819f337e7b0100014a429c6a8f59c2237b404f2f85449470ab561b56550b0f2a1ddc00199858d4cf6169290e2a30da734940a198ffb80dfd800ce79da16d3e775c7d920af646cdaf8c692f179ba756f2c85dc202e717146fb8a0fb12a74939b8bbfa220e39e025c7eec20e9b90676f563b9ef86ab762120261feb116b3002ad15e602b7207ba55e5c88cd36047145650543cd840e023c8574223c9f3671d25afa1e220f73e27f33aad1a99de359f6d77355fd6b31e2a58f3078be66ea729d0172e80550edd40e5c7f308e90c7dc33ee41b22ecaff289f377c77b26b13cbaa48b174eb7fb7c6c3d49b132aa3961e465b7a0d8651ca9998caa287902dc3c5c351506d5e87fbf20a38667293ae2a912cafd53138e9a490e7b086f4f45db434b28a3fb6404872ac1514d3554e5e3701238debfc6928fb4715c406c607603bdb7b0ea017635d1569da52c8e08df75ab83d5a5c4dc28b22f8878950d142a8be532bdeb2dac3ff94c2370641d09d32798222d1cd1e8bf31ba02393056d4bb2fbb9f8f5b2baa0c84738f46c0d23351b6ba4cdd38942fdce1f762e8faf359e6958527b3b02ac011135826f2377d00e1684bbeb017e6ee64b8c04978465f3021a81535cfc0165e7455fea450136fadd74efbfce3ee924093d541a078aaa9c54def41907b99a3a28d1bd195ad722c3a766332c5cf48b9994f8a47b2427252a03ea56c3983d46fb407b02d0f2cfa1ebd89ee52cecd3fd237ef3e08232225865b9afb741762e3d3800f0bfb95ff8fd1610c4d1baff064745278dc521ce17029d73c60ca8d233b1038d4a958492a32ac7193d4590daa531dada7fdb04f374a5ae5720f9f8c555734f84aa3b32f99c2e7a97ea9d5b756292b6ccbb53de0a41bca28503822975c3af8d202579a9ec1aa998fe2e5508612d89bdd32fc3c817cc6cdb9d10323e8c429b6263ad328c50275641271824cec2a7c0decd3083a6c86aae8681398a185677c0208ecaea8f61157085dcbb20f748c0b6f0ec92bb800a6c21220b48a5f16de324ecdc2ab8fa79631277d3584f397f0cfc68be37d3f99fcefa5e62ded805865612ada808db24aecff8cfc8e6434d9a0b934366715ea75f22476051c310822d5fbc02746bc7eedeb252e7f6818ceb30b7e16c0300195ef1db6faf8224907c03b17b32c4de5388f5692a2c410ae552034d40375457e32d4f342abaf4dc0309e12a138f62d572e53c5ae6385c81b226a89a87ac39283a23e2809023d84c1f50e5b419d2fe3f6769f2de960a00bd05a5b760c018b51c6c8e6df3e0b1f93a09d0170245ed1ae8999d1adfadf9d3f8c96f99e8905eed85a6ba16a1f898eae66b4f", 0x1000) 08:33:32 executing program 3: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000080)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/net\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000c0}, 0x40) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000002c0)={0x400, 0x1, 'client1\x00', 0x2, "6e45cadc4aeb2161", "738cfe1a1b01adfe699a630ebe5913c4d5ae29ce6488508cd39f421596349285", 0x20}) 08:33:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r4, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000040)="96fddbe81706e70d42f870291fb4b139a868923f2f1c82c48785c551851bb1d48dbe5e59036ba4352adec08cb9718c72ce886756d4a2583e72d6ade481ee2e928d06e6491952cefde0d0ab3f7d01a26d007de7e87eed89025a3f1beb94004fb6a959e0e6d05c2f8f57aa5bbbb6c774d63fd6a0e4390b0153324f194f844c36bec80157c6d7a747f28481a14f5b6abf5a15969489eda619d70dfc91b78272a35d8fee92394abd14401e8f660f5314", &(0x7f0000000100)=@tcp6=r3, 0x2}, 0x20) 08:33:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/231, 0xe7}, {&(0x7f0000000140)=""/113, 0x71}], 0x2, &(0x7f0000000200)=""/41, 0x29}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'sit0\x00', 0x0, 0x4, 0x6, 0x4, 0x6c, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x8, 0x10000000, 0x813}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'ip6tnl0\x00', r3, 0x0, 0x6, 0x8, 0x2, 0x4, @mcast2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x8, 0x74, 0x1000}}) 08:33:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000100)={0xe4, 0x1000}) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, &(0x7f00000000c0)=0xbbe) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x80002) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000180)={{0x0, 0x4b}, {0x7, 0x4}, 0x20, 0x6}) 08:33:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x2, 0x1e, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 08:33:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x890a00, 0x0) ioctl$mixer_OSS_GETVERSION(0xffffffffffffffff, 0x80044d76, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e22, 0xcf4b, @loopback, 0x8}}, 0x0, 0x0, 0x1e, 0x0, "8ed98ca10cb42d47c572a0b3fc2177cdfc453724eeadee5f0f5ae71eb1dc4a9669415cc328e35362d9774793c31dd4dd836e62cf2a5db22b31d9a36bcee91c65700e83e591e3751df021a405f7df08e0"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x1a24, 0x2, 0x81, 0x1f, 0x4, 0x5, 0x800000000005, 0x6a7}, &(0x7f00000000c0)={0x401, 0xffffffff, 0x1, 0x8, 0x7, 0x8, 0x4, 0x5}, &(0x7f0000000100)={0x7, 0x2, 0x2270, 0x1, 0x3, 0x29, 0x4, 0x2}, &(0x7f0000000180)={r1, r2+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x7f]}, 0x8}) 08:33:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'sit0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @remote, @private2}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="02250200f0fffffffda4f8a10f8d582de9d8e214967496b59abc4fb2b37beab30b8c6641a49f7902bfb40e074156b710079eb9a32d3594b07beafac34fa30b7b0faf1f320e28c8ca1215aeb95123f174b6a74c4ef5ef40fa68011429c133c29645126daa99de39db7b2ab9562aaed3b74341c26e5e3fb3"], &(0x7f00000001c0)='GPL\x00', 0x75bc, 0x35, &(0x7f0000000200)=""/53, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0xc, 0x6, 0x6}, 0x10, 0x1e10b}, 0x78) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl1\x00', r1, 0x2f, 0x6, 0xfd, 0xffff, 0x48, @dev={0xfe, 0x80, '\x00', 0x2f}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xb3, 0x200, 0x7888}}) getresuid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) sendmsg$nl_route(r3, &(0x7f0000000700)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x4c, 0x18, 0x100, 0x70bd2c, 0x25dfdbfd, {0x2, 0x14, 0x14, 0x5d, 0x0, 0x2, 0xfd, 0x9, 0x3800}, [@RTA_MARK={0x8, 0x10, 0x6}, @RTA_OIF={0x8, 0x4, r4}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_OIF={0x8, 0x4, r1}, @RTA_UID={0x8, 0x19, r5}, @RTA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x8881) setsockopt$inet6_tcp_int(r2, 0x2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x87, 0x5d, 0x7, 0x50, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @remote, 0x20, 0x8, 0x400, 0x10000}}) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/120, 0x78, 0x1, &(0x7f0000000080)=""/67, 0x43}, &(0x7f0000000140)=0x40) 08:33:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e22, 0xcf4b, @loopback, 0x8}}, 0x0, 0x0, 0x1e, 0x0, "8ed98ca10cb42d47c572a0b3fc2177cdfc453724eeadee5f0f5ae71eb1dc4a9669415cc328e35362d9774793c31dd4dd836e62cf2a5db22b31d9a36bcee91c65700e83e591e3751df021a405f7df08e0"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 3: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="01000000", @ANYRES16=0x0, @ANYBLOB="34faa5a5df7a3b8bf0c7991013d01ea60026bd7000fedbdf2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) 08:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/28, 0x1c, 0x1, &(0x7f00000000c0)=""/254, 0xfe}, &(0x7f0000000200)=0x40) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = socket(0x3, 0xa, 0xb6) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000280)={'sit0\x00', 0x0, 0x29, 0x3, 0x9d, 0x6, 0x41, @ipv4={'\x00', '\xff\xff', @multicast2}, @empty, 0x700, 0x1, 0x3, 0x8}}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) io_uring_setup(0x4e3b, &(0x7f0000000000)={0x0, 0x0, 0x4}) setsockopt$inet6_tcp_int(r4, 0x2, 0x1b, 0x0, 0x17) 08:33:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r2 = socket(0x1d, 0x6, 0x8) accept4$netrom(r2, &(0x7f00000003c0)={{0x3, @netrom}, [@rose, @null, @rose, @default, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:33 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2a0000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x202000, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) sendmsg$SMC_PNETID_ADD(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'tunl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'rose0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x54}}, 0x8000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x6, 0x7, 0x50, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote, 0x10, 0xf8346094c63e870e, 0x1, 0xbc}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_getaddr={0x68, 0x16, 0x12, 0x70bd2c, 0x25dfdbfb, {0xa, 0x18, 0x10, 0xff, r3}, [@IFA_ADDRESS={0x14, 0x1, @remote}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x5, 0x4, 0x4}}]}, 0x68}}, 0x44041) 08:33:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 08:33:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x80000) r5 = eventfd(0x101) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(0x0, 0x7, &(0x7f00000006c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000000)="4259b8b748c0daba76bf1966a0176be02381711d28eabf90bbf4", 0x1a, 0x7fff, 0x0, 0x0, r1}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1b, 0xffffffffffffffff, &(0x7f00000000c0)="2aaeb0c58b2ccbf5d6fa9a49ef6252925d251cc8d08f1575991bed1c1b137bcc045949cd814db8c1d9a1701d9a82585deb08bff743680f9763881da274fbc02fcc0560dd944478a10744e8c4e145a10489b894b8922d9fe795a473364a87626d03c02a592b7cd37ad55789e4529d8efb350c9bb3f18c0d492bfc1adee1eb0c2cfdc220878de9f303ae23de388f9a0370", 0x90, 0x100, 0x0, 0x3, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x3ff, r3, &(0x7f00000001c0)="a2007bdb2a1ed5577a1d72910c23a894f1621f2901f4382302d1cdf08e855bff068b50b5f34485482f50a795cd7ae1b98dd01924214eb9d8ca3438a2dfec340a2d181bf9e2b66ebf15d9b0390748b942a11635c9a454f697f9cc3769b10b4a036074dcbff7f24f01fb093bf68f42e4b1f06f95bc5dd8b9401839587b72f9ecbd63d0226c266fbdf6cbf3ded0ab6c1a8954733512138640dd1031bcf2881d6270253273e7d5f42bcf698855e4d27916585f8a50616d37026a103ca099ffedff5c644d50e9aa38f9ee1cbbb6d8ea664805efe38c28946c03598c22bf69866d423c1301ad5e98783f255f17", 0xea, 0x20, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x8000, r0, &(0x7f0000000300)="fd48751c73f83e85654b1f92565b6753b5455075984a0f3d1c04c72ba6be0eb118793c0969475fccf04a2d1b9303d1cb80476ba54b8c92eebe87909158cc477d67c10fc232f3e021bb3f49de097166bd11ae9e444a6faa52af1c525bfff0eb7ed338362fa37f7a40648f46732d158ac76131c425748c349ff8a2a6d8784dc8b84a262d94", 0x84, 0x7, 0x0, 0x1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x0, r4, &(0x7f0000000440)="d6d1eb6f645d701457b0644b8f7e025832232078cdfafbf565547a8c24f29674c22a06421e7f2a0148743c2eb5f35810c31070b9cfed1a503b831f24285ebd55fe31e9fef26dd140936a3beaac5d3e5d37440aa20f46906eb8e0e9dcecc1d1260e814c0aadbdddd8a18acb8275279c3e27e176a3e6a3bc2d462a815dd2b91470317ac839869b999c4258f8de893e1d449f47a2be00723292d3a7719b3d1989dfa585ed4463d33a41299b67b149d1a015176039d70b1c59e750a6dfc25981667f4a1448ba4648d344", 0xc8, 0x3, 0x0, 0x1, r5}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000580)="281aeec3cc83a04e5822622415cfd0f19161d7f92d96777ab3ddea5e6109a6fca211215143e45c21c14036c4d7d409864af63703ce8c92564f6e2a776701cc0103c730b4b224a58fa45c75", 0x4b, 0x7, 0x0, 0x2, r6}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x1, r7, &(0x7f0000000640)="94088356d87ee56c0af4b1ee0e2193b46f91036306526765fa234a0524333f6b80ccb608ba07fb07735bd79436481a0f7a63684ffb1a6bef2888", 0x3a, 0x9, 0x0, 0x2}]) 08:33:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 5: ioctl$SOUND_MIXER_READ_RECMASK(0xffffffffffffffff, 0x80044dfd, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/177, 0xb1}, 0x40010120) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000540), 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000200000800000006001b000000000005002200001000002bb336e150b2b10980834a374b409a3ec5fa463d366da944bbc133c803eaf8a3882eeca2e12d9dcf7ce8e3edecb19c7138b1995b637585d2581d0cbfdc249a9be523cc415abd386bc4d77c6d9d9741aa97b53c28418891d24e878e387563cebd7f4b20778806e287b264c095020c1e2022aa5e138ad1ae9e2213"], 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES64, @ANYBLOB="080027bd7000fbdbdf25080000000800194000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000004c0)={'ip6gre0\x00', 0x0, 0x4, 0xad, 0x8, 0xffffffff, 0x1c, @loopback, @mcast1, 0x40, 0x10, 0x6, 0x10001}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 08:33:34 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000040)={0x200, 0x1, 'client0\x00', 0xffffffff80000002, "eb9bb0bfbcfe3b8f", "52882026c7c8351d0303a37623ce60a45427354704e1804a7b71903dcb3ae068", 0x4, 0x1}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x3, &(0x7f00000000c0)=0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) 08:33:34 executing program 5: syz_open_dev$swradio(&(0x7f0000000000), 0x0, 0x2) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x2c000800}, 0x20040011) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f00000000c0)) 08:33:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200100, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d1a, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x581400, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="cf545db4f2a7d1b5946d52c6564d30d2163adc0e604c218d51d19f93c5c69bd405bc9523a6eee23967dea468af24b36606b4007ec082a8d18ce0823fd77d78a7d2a920f825e712c0a2c7fe154a181c09b328da465da371f742b263406b8a2ff54ce7df44aa96525d41b8394b47d165c76c2c9e33612fbb7ca7d9", &(0x7f0000000080)=@tcp6=r2, 0x1}, 0x20) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:34 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x290600, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x70, 0x9, 0xffff, 0x1c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @local, 0x10, 0x40, 0x1}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'sit0\x00', r1, 0x2b, 0x68, 0x7, 0x2, 0x45, @ipv4={'\x00', '\xff\xff', @remote}, @private2, 0x80, 0x7800, 0x6, 0x4}}) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f00000001c0)={0x7, 0x1ff, 0x8, {0x7f, 0x7}, 0x9, 0x800}) 08:33:35 executing program 5: sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x2a50e045ac4b22ff}, 0x4000000) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xb00, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x1) 08:33:35 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010028bd7000fedbdf250200000014000900fe8000000000000000000000000000dae0186717e09a01000000000000000000000001010500030062b7c4000000050004000100"], 0x4c}, 0x1, 0x0, 0x0, 0x8040}, 0x4008001) socket$inet6_tcp(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000640), 0x701302, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x2, 0x1, 0x0, 0x0) [ 2651.358201][ T1193] ieee802154 phy0 wpan0: encryption failed: -22 [ 2651.364548][ T1193] ieee802154 phy1 wpan1: encryption failed: -22 08:33:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:35 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r2, &(0x7f0000001800)={&(0x7f0000000140)=@qipcrtr, 0x80, &(0x7f0000001640)=[{&(0x7f00000001c0)=""/197, 0xc5}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000300)=""/34, 0x22}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/27, 0x1b}, {&(0x7f0000001380)=""/112, 0x70}, {&(0x7f0000001400)=""/202, 0xca}, {&(0x7f0000001500)=""/32, 0x20}, {&(0x7f0000001540)=""/186, 0xba}, {&(0x7f0000001600)=""/33, 0x21}], 0xa, &(0x7f0000001700)=""/246, 0xf6}, 0x10020) eventfd(0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400ff87", @ANYRES16=0x0, @ANYRESHEX=r1], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40c0) 08:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) setsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000080)="e27a1634372a88b8408b6c6202dd8ec27e300863e1d081505f8343d0f5bf2dd14ede74da590e0e7d70e0c19d2c1b5860eacbac0618dab5996793eddcb42a15e7e1f05bf80388342c6cae2b6a7ec9dc0fba41dd808b1ac4c725566c3dae9bb5686495c511a43c4e0ed2c87be16ea276e889ba25efb749e013ee298cd316d918ef26dff8d37dbb5b7da9f17aa9cbf0d023134da7a914767badb3e224b2f6174373860d3b9c133e20901795d9f2331c05c3f4ff4612b670425f2f77575d1e04cda1b99a26a0c72de1a5d6f5aac3c23178f7f20fab8a6e58277d49cf8176", 0xdc) 08:33:35 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x200041, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000040)="6af7846cbd4169e876108191fec1ac3851edec3fdd288549218e2b2046237a2a6f312b2affb14c6a559ce7a860646cd4fb40f240e355907c7cb29e74c1e9128d58b060c14da0b821ad2d0172bc9237ea6aa03d4560740bb971c5f316786ff79e61", 0x61) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x800) 08:33:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0xff}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7f}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x14}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x24000040) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x20400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$IEEE802154_DISASSOCIATE_REQ(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_REASON={0x5, 0x12, 0xb2}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa3}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0x81}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0x40}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0x7f}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000810}, 0x40) 08:33:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x24}}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x19, 0x0, 0x0) 08:33:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 3: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f00000000c0)=0x9, 0x8) 08:33:36 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) 08:33:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000240)={{}, [@bcast, @default, @null, @null, @netrom, @default, @rose, @default]}, &(0x7f00000002c0)=0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'syztnl2\x00', r3, 0x2f, 0x8, 0x0, 0x4, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x56a1b3f0308e3eb5, 0x8000, 0x7fff, 0x3}}) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000f3", @ANYRES16=r4, @ANYBLOB="000825000000f9dbdf250100000006000e000000000008001900e000000208000a00030000000c00100000040000000000000c0016005d07000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x48804}, 0x4048880) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r5, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x44, 0x0, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x44}}, 0x8800) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 4: r0 = eventfd(0x2) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000140)="4a77d2538e460663078e7e521c68ad3b5c0c7ab0b7456747b87ee139c208ae2e88bf49f807a15bb407f05878a2b700bfb852a7ee1069f440d8f616908c3e11e760280bd8758011d853c1134e4f13c86c3dbaf330621e34b47177a30e871fe0268b82356cff9d05a27bfa039fb991dc3ac65dcd2455e8d4c754220cfa45a73636910bc57339f3b898c04637f772e22f7034e9f8322f10594f39322a4b3c3e940f984b32fd208da13347f1cada4b518bfec877f480473fdadb85cff85e7ee9f9abd30d6f3523a28ebdfbd8fb18b2e5aeecf59b69773f8fd878666b389e1479e752a34e483e14abe489f43c6f10ef1af931", 0xf0, 0x80000000, 0x0, 0x1, r0}, &(0x7f0000000280)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000081) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:36 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0xf8, 0x4, 0xff, 0x18, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40, 0x80, 0x0, 0x9}}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:36 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x2f, 0x2a, 0x1f, 0x7ff, 0x6, @empty, @mcast2, 0x20, 0x700, 0x5, 0x1}}) setsockopt$inet6_tcp_int(r0, 0x2, 0x1b, 0x0, 0x0) 08:33:36 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:36 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x591400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0xc9, 0x1f, 0xffffffff, 0x1010, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x7fffffff, 0x9, 0x1ff, 0x402, r1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x40) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x3f, 0x81, 0x42ef, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @private1, 0x7800, 0x7849, 0x4, 0x800}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6_vti0\x00', r0, 0x29, 0x1, 0x80, 0x1ff, 0x25, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x20, 0x3ff, 0x800}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 08:33:37 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) 08:33:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:37 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 5: r0 = getpgid(0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newneigh={0x38, 0x1c, 0x400, 0x70bd2a, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x80, 0x0, 0x1}, [@NDA_MASTER={0x8, 0x9, 0xed}, @NDA_DST_IPV6={0x14, 0x1, @mcast2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004}, 0x4000040) 08:33:37 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200400, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x9dd4, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 08:33:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 08:33:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c8f0}, 0x881) 08:33:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x4, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000300)="ac0ad8a6402f29fc92c42b62a20f4b7089d220cb1cee53e874195c419b2427aebbaf98bd4ed9f9f74484fd7669abf42252fd7915c48ed51fa556fd598f543e1a4873b34d0a7be6bffee81defc22ed4c8c437aa192dbb95794a2310036c656208400ced0e3b7b3a4969ceaf400ec3143f5f2ca860800031d2d72e1984b9f343c6ef2fa20d9690f92e3effd3591015b96e0d6fe6bb6795938f73615af1c109fc7d2df6e765baba6cec5ac9190b4e9a4f449ec99e3fb15d8df7f028f8e6edd26c8fee87b2b55ce434dff3fce0891ccd87d3b79c8a64b86cd4d869c190ffd849e3e5bf71d3d029b4fe75c55418ad21d229d46e27ea0501", 0xf5) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100)=@gcm_256={{0x303}, "d5ed1cc222227344", "3be798ba50d3d2c9fa72ff6489b2a036d43626459f5a8de70337d521722986be", "ee1d0d93", "98227eb3cddb09ea"}, 0x38) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x2f, 0x8, 0x8, 0x8a676cbe, 0x12, @private0, @local, 0x8, 0x7, 0x3, 0x9}}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0x0, 0x41, 0x0, "410d74da5db4ae57ff06aec164ee77cf671719a5b996b32f8502dee5f89748ad44c3480c2c66adf8c9f1cdd1ee5bfc3fa8d6784bfe2a7cb3a6deb87bbc04954bfff75ef1923d66296f7bc41017ad38a5"}, 0xd8) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000000)="f3d07b6f819088b62d60085810d923b13aff631a88c816cf8b5e8eadea1d6563d6a17ec1808b0821db38f344450460779e1f7decdb886e5d47e950559d344b5635cd8dbf1d838ac4da70666546824bf84130e346518ebc505ccb0d3629ee418a02068df0426794f775030578d4e1f91ea8b4afdc1516e8f2d41f430f6e8f5dfd0b730be69befa1a4dc093a0e4726d5a6ac0157960cd95ba88c8729dd0f3557c89a70a2e3a5ca8611f3ebe6dc7c62eacf83090203e5e4c7d83f6e4fb92351aec15098e1946a791107416dea61cfb52211e6e48a05444821c9117978bec88561763f237bfb6884caffa530d9", 0xeb) 08:33:37 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xb) 08:33:37 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20004800) 08:33:37 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x78}, 0x1, 0x0, 0x0, 0x11}, 0x6040095) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x29, 0x9, 0x0, 0x23dd, 0x4c, @ipv4={'\x00', '\xff\xff', @local}, @local, 0x10, 0x20, 0x7fff, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', r2, 0x4, 0x81, 0x7f, 0x10000, 0x10, @mcast1, @local, 0x7800, 0x7, 0x3f, 0x4}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0x20}, 0x1, 0xbb1b, 0x8001, {0x9, 0x7b}, 0x3, 0x3}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'ip6gre0\x00', r3, 0x29, 0x81, 0x20, 0x0, 0x18, @loopback, @local, 0x7, 0x8000, 0x82e, 0x57}}) sendmsg$nl_route(r4, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@mpls_delroute={0x28, 0x19, 0x400, 0x70bd2c, 0x25dfdbfc, {0x1c, 0x80, 0x0, 0x9, 0xfc, 0x3, 0x0, 0x4}, [@RTA_MULTIPATH={0xc, 0x9, {0x4, 0x30, 0x8, r5}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040801}, 0x11) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) 08:33:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 4: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000040)=']\x00') r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x2c050) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000140)="c4decc40134be69f6068fd45a609aa5b917c90dba691a79718c861141548814d3f58a15b16eaeffe14e284ffd6632d724457631fa2dfe45b065def12da12b4bbee8b00a9d2b6afc5585fc6213805c5b2b2d1c9d54f", &(0x7f0000000040)=@udp=r2, 0x2}, 0x20) 08:33:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x3, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3cb7cf3f}}, &(0x7f0000000100)='GPL\x00', 0xffff7801, 0x1000, &(0x7f0000000700)=""/4096, 0x41100, 0x18, '\x00', 0x0, 0x8, r2, 0x8, &(0x7f0000000140)={0x2, 0xd1}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x8, 0x9, 0xffffffff}, 0x10}, 0x78) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e21, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x3}}, 0x0, 0x0, 0x24, 0x0, "539b198a6a1d8e279ae8aafe6d26c3a9afc814fdaefe408d6d729b17ff4d532cfbf58ccdb6576fdd94c3ac1f83d46a3c9746bc4efac71213a0040e37d2009f2560d527f88e3cb4258664654c13c75aab"}, 0xd8) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$netrom(r5, 0x0, &(0x7f0000000080), 0x800) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r4) 08:33:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) 08:33:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0xc, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/213, 0xd5, 0x1, &(0x7f0000000100)=""/174, 0xae}, &(0x7f0000000200)=0x40) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000280)=0x1, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'ip6_vti0\x00', 0x0, 0x2f, 0x25, 0x1f, 0x2, 0x59, @loopback, @local, 0x8, 0x10, 0x7b9}}) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000400)=0xf5d5, &(0x7f0000000440)=0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000002c0)='memory.low\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000300)=0x3, 0x12) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r2) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:38 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x20100, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x18000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @empty}}, 0x0, 0x0, 0x49, 0x0, "bd93f350dc68a02236ca253f88e263e78d0ec17a97a72ce2a848ab917ed31f67c9c54749976649ee4b5d91bd7113bf6ac91a742b92f90e198db708375eba3ee810fefa94c9da75eb0dd888b670536aec"}, 0xd8) 08:33:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x204000, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@func, @ldst={0x0, 0x3, 0x0, 0x7, 0x8, 0xffffffffffffffe0, 0xfffffffffffffffc}, @map={0x18, 0x2, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x101, 0x5e, &(0x7f0000000080)=""/94, 0x41000, 0x4, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xb, 0x1, 0x1}, 0x10, 0x193ef}, 0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x2, 0x0, 0x0, 0x0) 08:33:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) io_setup(0x4ec40, &(0x7f0000000040)=0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001140), 0x2, 0x0) r5 = socket$l2tp6(0xa, 0x2, 0x73) r6 = eventfd(0x0) io_submit(r1, 0x5, &(0x7f0000002380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x8, 0x3ff, r2, &(0x7f0000000080)="5f574dddd48e9c97c67410d8737c5898b0b63cccf24c648a7a2f7e00d410b8a17eb57a63f6daae0aafed3427273f475f4115ff20ff41f9dc14c9c4ad7b38d1abff77845767c9b3b1ec64b88efe15068a395ba9636015445de84f60215cd32f6a44f0dc28c987010c06f86e315f4c20971099a3d5a046b3fdb0b2917b9d86580aaa706130a5d5cfbed7ef25a6101d1e6020b90e7c26ff1f52e3bb9fd4c059b1c10401e146af975a909db3a35e9f115d58a5105de489149a0186e8b1ad1a3a9a4382a4ca94f9d5843850b554da0d1a70d9cbcb0d1a2a1025c7f0fcc26644a77497fa5f7e4c991abf4796cbf2f123cf2c9094da93e4513354319633e2040f06204ed36b68f1466582d78cd2c8697eb4015fdcb3f266683eab2abe605cbad6e1a21c41607f51caa14ba417e7a21918d45d0bcd79ab0730ac321de844b0e047ab13b19cd95bbc6ef9090cefb5cdd3e44d3971d15f4cac50f50667d672c91edb12dc61363484b8bab5237cb5e50755b8042c54f0bea1cb68db4594f1d815a51b6551e7ec91b3165159f2fc2c979bf1fd3249057b68fb8a209daaf4104b099dd23b76b635f1a8906ebfb30d2cbd19aec7c872ca6071802a097a86192d880de9f9e6d2d9163804aec0f2b4bc37510ef035fd9e81d19065452ba10266e19960e559e13ad8a2901357b1905914134e8e7fd85767de6115d4a9de9228d9d54dd32a50de0e15a192d528ad2ba83f3e6ebc987462710cf3ac91a18c484b4712e4b788acf4d94e77a1495a87fbaf72933d0f6bd50c1f53489d712018e7df0cad0629c53eb9abdaeb00495bf17e8898c3d5c5d98a5ec641b1a45695c800f7800d6aaab8f4b39699c81f3d213aec8dcddce74a3d9a34aa8d18720176051f409dac33e6dc6670a5aa0a6a2197a516e6f58126003de463c593fcecb2b3574b3607c5f145162acede487cffc06354d34e9659c9da08b3d9c6af12de5408a6b21d9b5d8cde7682f633b7ba3d9a49b20b868d119cba6d351a7ee372b90ea5f473ef656ec8ccac778d0749f232c10b1bfa5fd955073f710378415a91b00d3956d1e33dcfb2234fd98a196ce0435b83403923c68c78ab733bae36b326fe775e3c472d2e28ef1bd6d30ea6f4b1be418a7710819cfc66bfc5a31dcda41985bb746bacc2a06f55a4531349a41ab2c6e90a3ad82f75d89ff84d946a493fb47fe49a8f45af1ecba5d9d4e0aaac9aad1a959cfb4ad78353d6d4296cf512724cbb85a560e6174b2e38a1211e3d50ebed97c4cb1751c458844e4dfeb1c37c7324b6715144d834ce39320647e8f715616c58a820ad615726bc93c429646340afa8c9ac10585a3b250823e7b61a8f3afde496970fbec92fd38164e2977baf4b23755b080325f79f78652741d5d287016b7426cf60ffe6701cfd09bac9dfc19282b1eebce1a9c5ef70255ea512ac792f764c3a417bf909df0ffbe961ea174c5479dd606d65fec752514f9a62a55a0d874deb2aac3750f103658037e051d47190778417036c2c7a7662355d4c18a6ddf570342cdc6d04c5c0d6effdd47cab7a28062f8770c89d63b104c3acca482ba27fead289a792c63785ed8d873e4d3751b7a0473ebb22e44792e9670a5f811e46438a1496160ca00f58aa893da3772d3d9099895eb7dcb3f75e715eae148bb75c9e68736d1162cfcc70f8a4fe0c91a5af39c605c2ee7121a4e16590674cb8dcfafd09cee6ebe6fce528170c526082eac41c526fe50d9d2efe67dc0767414807215a558d97f3ae1a0bec219e66642539981bfe5726d927ab35ee360d421fe498bd0a0f82715110b5f75b4839ff6658eb73294155a143e82e17a43c9cd95fe4e14a030eb778a91f70855464ed090798bfd9f0fa06f9d0a1ab3f57722e4ce458dedcba83a946221e678b53cc6a75ce5091e83887214266323ee7039089124cae06c4e608498a0bb001c0293e7d6f1f05f66256a5e949e8e4d9f366addda85e115cde45685e88c9333365e38f5026d0039eecea5d0fd00a81b963b0c7ff2d91b7c0d25743607269f2b5e26c361156fba8f6019b53e75808a0a87fea3b9d7ed3ec3b524ae6e09b5fe9bbf927343b6591b8aeef6c4ac4548b4bcd1431564fad747ec03ab00aea34b124eef257ec2a5565f20c84947e0bfee937864eda2554a5ad4d1d4ef9875700478688025babc9d26c8348d86db2d92f82aa6bf01c636b21b680e825700ed8edb001b15eea25a17e70da932c6d796abf7bce1610fdba8b2ededa20c1446520d559cf881b5b557ce815c31a715e6c726628cbe356fc782b0f877bc9c05f84c262bd5f3b1df7fe79eafd63fa5a3ec468b6f00a78541278d8e0157a137eaf41d0968038d6dd58e6e5befa3382ed56ca7f62f4f5ada9c819ed9d3f76e1945d1f8aeb3d0f477a399fc5d4aa3c31e8d887cbd03b065667e730e2db9f264b75eb6edd8feaced82d6c77c3dbcc0b3ef3f291259cbd44304ee38f3f9be6b0fef17a81e0da612c5b26beba94f325a1bc50d43968a210641c4c64b59a3fe11d4eaaec08eb1d61b903f6467f23603653fd5715fe4a4571682a6a67ec12158b497e45e13c98c4167f90930828b6cca4a0450478e0f3e58adf00193af28de2c778fbed82fb105d6d95da02329c20f05418723bc09c8bf9fd0504765169979cccae802481e1ddc477ddc33f9f3678926873eef301b425054aec76e05a93d7d9cfdeaefe69f53d12d6618fcdb8ff81e078d5530478b63ba0372c772d508632c917d90f3d700011a2805c810176338fbcedd05e191c7e61f01e7bf74a0bc2b11182b00118f12111d6813cc780a565a002e09689a21bd4b7c573c4c23edb4a2022ec29e9835b5119eed0f1aa14de33b60f9f859ce94e8951eb5c1a900ceebee825aae574149334abd195c6468883750c95e7d71eeafed460f4bd0938ee32e4fdf74d72a5473df69aaa2f2d62529fa351a3ce3939eb8fa6902410e393c2ea58d62a4a64dbf50e6214a50a79d257056548f2d4d3fd8f6b8df9fa95f4e4b5288641ce3d72676bc3179cd38085075f211b3b04201487eed75a11606ee2cedfa20b572f1350995f02d9a2d607fc4a6106fb1248b3620b1c77d4b4b8e1ec728c88442e60ba98969769998c956fbf48d382cc6e488c314a6ea9e366396d64b37d7aa1431738b791bd9edee11f4f5999ee4884adaf757d0b3fdd59d802e0f991d9f97e45b57cf31438e3ec6a38fd4aa11b25c0081a556f163f4edbb40ee47d9b732ecbd1f5868019fa08d8758ffba395caabb3939262dcce4c9b5f04e7d8eb2d2eb96651acbc334d0a59db644bc39636a566f6c0ca028b6698d8639358ef607b45e1de3f3754cd2ab36c7080f2516c09527d7e4bfccc07b4af2e7705250926c5360da0a42910237eea9757ab5bb399eb2b354ce678213ac97c6a0e5c0d3cabf06f4c3431c74d9e59692a701f27dfff76d60859d7fccf5855113ff6bf2cb60816855493ded9c1af508d178831224ebcefa429a83483792cd45634f592899a74369a3c1a683bf70d55cb5087a7dd1731a352b3f333ab8a27ab9372c4e32c0bc63af382205e7d8d247b74351a6cae6370c749d97a5ebe8ad0f78dee1f8ca2657578f1a257891ff465ac873f5f7d356b657f11a7be88bec6e59a35796ac9940af2eea08c5dc4164363f5bf6ead3685239f6bd2935968314245d569df11a0d80f85d412ef8719adf3eb0fc2eaf25163499a755a7998eedebdf1b6793dbe5bdc0de179f71165a3f6e1401b48e3da499aeb50af49ac1a368c012f0e7cbff84b6864ec871d10324333ebc682077305b88b3a9efd8f129dd8ff008689e90fbb94300b72c1602edf842260ab4d6474539bc9a588601cea9c86b3adbe3fbc1b1182c7173371172a6b7772f5e098976ed0c8130fa1d457b5771f884f7efb2c2661e715c0e511465d0b2246fc2386ad6c149beb29562840ef956912e09940f348ead34d9bd6fd4f8e07db1857216761267ab4fc61ad48fbbe11a016503ed3556aa699eb991ee3f9b3ead5c07657a338145b8a19eea4e136253a0c3a934ea3d31947af177fb4796451d80fe525577eb9554a499e22b1a1f9d2f8a26f1c092b5e9d9e0035e1e40da3264a8e755fd6ebbf52b34d5680a2ab24aba4f805d3b08db6a7e8c12185197e68affdc6f2c04e3a675723430eff9b91ed14d0fc46bf515f5a6a065da8ecb6e3df6d52d52ccd2b3af5598fade69d14c53ede7adb5029155a7cdb7978a5ef6bbf6dbc8ec696d72ba9d714c66c3660025ea66411e398adbf5d03a6cade04beff11208ce73e6c27a9e7259c4588c61536bc1a9f3508f19f5135c5a32c4151f340db7cd3cd6f2bc13026577b7a0c220a8a7a26f8c28b54452b779c56b9044e7097478415264c9723a60a24dd1184b01d3d7097ece79660e721eb15fdf78895df2898635783b79a5e0fc3d8ee85f5138747fe52dfaf9699b51de46dd9e2ecae139aa243515c1796d4c9916bbd1bd36b9b60f6b462ae09545afa0c642a1b4757496e4238826fbb3c69c86ffc63de6de5c0f1ec12c2172f083896b71978f8fb5394d3ad80752d7def32ce14494dbb6aa64261105d785c31921d84a577b3b56cbac7160cd6a48271bd91445e3e57241364f59eb46b88f31bc7c6e5a768cf5f2fd122e7206ed9a745cf5f2fc6d0085e5619a2bc8e24bd64e73ff3b092f7e131759339d696eafa2357689cedb5aa183ef5e7da545cc51959801cea01ed4269fe4124557ba2a4916f348035dec3e56d1fcc13f044effcfc35af9c161ed33085c42744962e83cea30e2d92846ece582a98e3b1ec086887f9c19597339e020cc2c1d390e984968c5abbc8edba1d7e0be88dde4e5c5c956054f27268d4a81ffb1257076c8a7e59a99f386f7facfd3220bfb43435fc2aa567738fa94f8b0c9b894313f5ed9a39563dead1fc545fb6500d63c2961e0435cd8078179c99f95d2cb1e74ef14c8b4f0537a806d190690844f72a000cec5d733bb77b9c87446d1efb06261945997d740763684ee5db16004dff8b136e2e6db3d5343ed6ee0421be8a30d7650742d0869cfc769391b46b2ea6eb878e1812a8fe157564d574807ef769912391e3e45399c11954e0ef574793d80109d634a226b32207b67507e14092e169b04b238a1301657be43ba2d645fe446f760e8a3c7b52482304ab00cde4ba3372846ce9d6f1c7853b5568ec57c85af67e87cfe4de1b64aa8f4fe5100d1932b9d5c4ecdc4fe5a3e0ab87a189960fdfccfc0d960724aafa164690359857a197133018474a145d948efdeb2a29075e4ee5890f38277c34998c36ec816ab272442329ef5071aab8a6791edd90ad70638ac9eacdbaba8dac810467e5b15a2c8a766d6e127258555ba0acbd2736d9f10ddd1a5ee494fe068b6986c97b97571d71ce19c6f7876603021b344a62bcc620d33507d7ec420c49a4e1e41459a725ae3810a55aa1f449e029b5d5b9f7d69305c5dc35c1b537f5d98308044a0c6fa7b53deffba86139a7578a4622fcaffb4466100663e9c80764c647a22522e0cb7a9687d8f525a1eca2c313113c42475b149dba99644cb07954c32a4e8d9e94d684d658b59d607cc9f3395abe083bfe836646ecdc1826f49000cd94d4a0dde1373da0b5e20f51c034db9e532dc9b955bec81dc56fef3ec8fbf9361cc51b87be81c25da6605ba74be2c91100cb26e6f1b46f25cff04f0bb6ce9ecd074e07cd1050f981198285db42d527440b062aa49f5531072abd962d2247a7557f00081f4dd18564fda9665d72d9819940e1a6719a78ecb7d4c1db7d898e", 0x1000, 0x24b88285, 0x0, 0x3}, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x5, 0x8, r3, &(0x7f00000010c0)="39f58a4fa2dd69341bd6ae119ebe29462a1c4c2da3", 0x15, 0xd8d5, 0x0, 0x5}, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x1, 0x100, r4, &(0x7f0000001180)="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", 0x1000, 0x5, 0x0, 0x1}, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x6, 0x1f, r5, &(0x7f00000021c0)="22ef1bf6e419a5346013d2ced45e9b49fa4520a8612941ca8e5b89c592aabf615836d3cb917a3176719091acc860862c3c28bd96b275da46a2ae8df69e354075e1f4fc183d97158ab003f36a201e14c0d8b7e03993be9508acdc96ed6ac4814d9c169aa4285b9037998fce35fe2094f57650c8a10118529c06f1040857d416d5f36bd99a874e221219390bdb414cae073951e342bb641f27bb4025e1abd8ccecf7dcd0679f489a08c56f4f792aa974e3b4d414e7f921671820cf67fbe21ef8c992de7771d60e7740260303a9655c72f4f9a65f7d9120e439d73e15", 0xdb, 0xfffffffffffffff9, 0x0, 0x2, r6}, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x6, 0x2bf, 0xffffffffffffffff, &(0x7f0000002300)="3b8aefb80c60df2fb46e6ff41d84948b52d22d3d5071cfbddfa378189dd92bbf4fcf83a2892dcb847625a07d5cfa5c2f48c23afe2480958e4c98becec538", 0x3e, 0x4b12, 0x0, 0x3}]) 08:33:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e24, @remote}}, 0x0, 0x0, 0x46, 0x0, "dee3da71747f2714dbf675d6f76e3c73ed0fc03707df6914f90a775b89cdf8d21a5c0a6d094697cedd4f70aabe65cca80677b5f809fd9461889c0ab9e408847607ced0e67dad6cc29d6b1dce005739c9"}, 0xd8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000140)=0x9, 0x4) 08:33:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:33:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x2d0880, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_setlink={0x38, 0x13, 0x200, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x80, 0x8100}, [@IFLA_OPERSTATE={0x5, 0x10, 0xff}, @IFLA_GROUP={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff7}]}, 0x38}, 0x1, 0x0, 0x0, 0x40014}, 0x20040018) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:39 executing program 5: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x4, 0x703d2b, 0x2ddfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x110d7fff3887eb6c, 0x21, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x80) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x3a) 08:33:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) timerfd_create(0x9, 0x80800) 08:33:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4800}, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:39 executing program 5: getpeername$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@default, @null, @rose, @null, @remote, @remote, @rose]}, &(0x7f0000000080)=0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x450000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40400, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x0, 0x2, 0x4, 0xa, 0xc, 0xfffffffffffffffc}, @generic={0x7, 0xe, 0x2, 0x0, 0x400}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}, @jmp={0x5, 0x0, 0x1, 0x6, 0x9, 0x8, 0x10}], &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0xfe, &(0x7f0000000140)=""/254, 0x40f00, 0x9, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0xf, 0x4, 0x4bd}, 0x10, 0x655}, 0x78) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) r2 = socket$netlink(0x10, 0x3, 0x2) socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, 0x0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xc0}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4b}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20}, 0x4000) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000480), 0x4) 08:33:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 5: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000000)={0x7, 0x80, 0x4, {0x40, 0x7}, 0x5, 0x40}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000080)={0x10000, 0x7, 0x1000, {0x1ffb, 0x40}, 0x9}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) 08:33:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000080)=0xc47, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) 08:33:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0x3e, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x28}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x7, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000480)='GPL\x00', 0x1560, 0xe, &(0x7f00000004c0)=""/14, 0x41100, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0xb, 0x6}, 0x10, 0x26b43}, 0x78) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x29, 0xff, 0x1, 0x40, 0x52, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x7800, 0x700, 0x5, 0x379}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', r4, 0x4, 0xcd, 0x7, 0xc0000, 0x11, @empty, @private1, 0x40, 0x1, 0x6, 0xfff}}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "5d95a386f37005b1", "441544bcfefce0048d8ca563d358098e", "8bf9f05e", "07b0d39eb715390a"}, 0x28) 08:33:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x4, 0x401) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x90}, 0x4000) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x59, 0xdf5, 0x10, @dev={0xfe, 0x80, '\x00', 0x1e}, @mcast1, 0x7840, 0x10, 0x3ff, 0x5}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x42b40, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x2, 0x2, "5d2b5a81"}, 0x14) 08:33:40 executing program 3: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r2, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x2d}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xf726}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcf}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000801) 08:33:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@remote, @rose, @default, @null, @default, @bcast, @default, @default]}, &(0x7f0000000100)=0x48) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x800) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = socket(0x1e, 0x2, 0x7) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000240)={{0x69, 0xdb}, {0xff, 0x1f}, 0x9, 0x3, 0xa7}) getsockname$netrom(r2, &(0x7f0000000140)={{0x3, @rose}, [@null, @null, @remote, @netrom, @null, @netrom, @default, @null]}, &(0x7f00000001c0)=0x48) 08:33:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r2, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x2d}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xf726}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcf}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000801) 08:33:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:33:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) 08:33:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x529303, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x20100, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x18000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @empty}}, 0x0, 0x0, 0x49, 0x0, "bd93f350dc68a02236ca253f88e263e78d0ec17a97a72ce2a848ab917ed31f67c9c54749976649ee4b5d91bd7113bf6ac91a742b92f90e198db708375eba3ee810fefa94c9da75eb0dd888b670536aec"}, 0xd8) 08:33:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r2, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip_vti0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000) 08:33:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x4440, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x9, 0x8, 0x7, {0x0, 0x40}, 0x3, 0x7ff}) 08:33:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x2c050) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000140)="c4decc40134be69f6068fd45a609aa5b917c90dba691a79718c861141548814d3f58a15b16eaeffe14e284ffd6632d724457631fa2dfe45b065def12da12b4bbee8b00a9d2b6afc5585fc6213805c5b2b2d1c9d54f", &(0x7f0000000040)=@udp=r2, 0x2}, 0x20) 08:33:42 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f0000000040)) 08:33:42 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x2c050) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000140)="c4decc40134be69f6068fd45a609aa5b917c90dba691a79718c861141548814d3f58a15b16eaeffe14e284ffd6632d724457631fa2dfe45b065def12da12b4bbee8b00a9d2b6afc5585fc6213805c5b2b2d1c9d54f", &(0x7f0000000040)=@udp=r2, 0x2}, 0x20) 08:33:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_newneigh={0x38, 0x1c, 0x20, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x0, r1, 0x8, 0x18, 0x8}, [@NDA_DST_IPV4={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NDA_DST_MAC={0xa}, @NDA_PORT={0x6, 0x6, 0x4e21}]}, 0x38}, 0x1, 0x0, 0x0, 0x48000}, 0x40004) 08:33:43 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x2c050) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000140)="c4decc40134be69f6068fd45a609aa5b917c90dba691a79718c861141548814d3f58a15b16eaeffe14e284ffd6632d724457631fa2dfe45b065def12da12b4bbee8b00a9d2b6afc5585fc6213805c5b2b2d1c9d54f", &(0x7f0000000040)=@udp=r2, 0x2}, 0x20) 08:33:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x600040, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000280)=ANY=[@ANYBLOB="0ddbeff46a091c3b6b6f1b7dd17a817ec52e7282ecb6955e46f1c68798bec0825081c0475d21cc5e32045143cd0ac0a229be2d0de9ffbeb7cc07552ade0b3e147451e052bed32231d774a87c48074cb42a34c046ea658d9f87bdaeb6bdad7f8ede0e447e11a50703a4273fd3e9f21ec9662e58e6f478e34166525b2e7cd4d8880cba5c0da7690ca5743300659cf01472fb2c63a19fcf04d98a6ce5ff2d702f3dc3b0ba9b24ace8f4b934d86b135b7d7a0fcf961db71e301fce17c351e48568b07fea9cab0c88350338f5c113a68f1ef2fb23d3bcc9f50c3b05effd7a5ffdf185", @ANYRES32=r1, @ANYBLOB="e600000000000032"]) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x5, 0x0, 0x72, 0x4}, {0x2d8f, 0x1, 0x4, 0x1}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x200040, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket(0x8, 0x2, 0x87) syz_genetlink_get_family_id$smc(&(0x7f0000000200), r3) 08:33:43 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:43 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x2c050) 08:33:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) socket(0x2c, 0x3, 0x401) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) 08:33:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:43 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:43 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x6800, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 3: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_pgetevents(r1, 0x9, 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl0\x00', 0x0, 0x29, 0x80, 0x7f, 0x80, 0x29, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0x7, 0x5}}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)=ANY=[@ANYBLOB="7c001319", @ANYRES16=r2, @ANYBLOB="00012abd7000fddbdf250300000006000a004e21000008000800ffffffff08000b00", @ANYRES32=0x0, @ANYBLOB="0500020002000000140007002001000000000000000000000000000214000700fc020000000000000000000000000000050002000a000000050002000200000014000700fe88000000000000000000000000000108000b00", @ANYRES32=r3, @ANYBLOB], 0x88}, 0x1, 0x0, 0x0, 0x2402c094}, 0x4010) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) io_cancel(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x8, r4, &(0x7f0000000300)="6e3f0e5bf870aa2d247968eb9b8e4f000f3a824427aacf555ea32b5b9259de503f4618738f041a8398db647d48672243ad3f74bd24b3e8575643ac82bccc8d9d782f422c39b81c39e8990ab2263f6c2af07cd80b047d85e2418013a7c5dbd2e9d5332ccc9d11d58aa2ed167e7ecaa6b8c81aac827f9b01683e76fe862ebf8587b69a44340a35b504bd7d1be1e3d1077fa357d2e2ace5533662028acda980a7007bf82f529bf5f126f9a61d9ee3aa91312b2203ccbfa956d5de1764a8077cdf4ecfa715b30821cd65bbffa4d6a1c6b12556a864f7b835cd1d4d6909", 0xdb, 0x6}, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) io_getevents(0x0, 0x4, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)={r5, r6+10000000}) 08:33:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:44 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) socket(0x2c, 0x3, 0x401) 08:33:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:44 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket(0x2c, 0x3, 0x401) 08:33:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x616380, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:33:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) socket(0x2c, 0x3, 0x401) 08:33:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bond\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c891}, 0x4000001) 08:33:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2c, 0x3, 0x401) 08:33:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'macvlan1\x00'}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xe40}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x51}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20004400) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xb) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x8281bc1d117c84a9, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff744e}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8010}, 0x10000) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x1000, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @netrom}, [@rose, @rose, @bcast, @remote, @netrom, @null, @null, @rose]}, &(0x7f0000000100)=0x48) 08:33:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:45 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) socket(0x2c, 0x3, 0x401) 08:33:45 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="100029bd7000fbdbdf2501000000050013000800000006001c00130e00000c000f000400000000000000060002000000000008000a0001000000080009000100d17ec78f25182e57bc25e44502b046ceb0320379820189e0f79af43037761b9d18508356984eb700"/118], 0x48}, 0x1, 0x0, 0x0, 0xd0}, 0x4004000) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:33:45 executing program 0: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 2: socket(0x2c, 0x3, 0x401) 08:33:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 0: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 2: socket(0x0, 0x3, 0x401) 08:33:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0xb282, 0x0) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f00000013c0)={{0x3, @bcast}, [@netrom, @null, @netrom, @default, @remote, @default, @netrom, @rose]}, &(0x7f0000001440)=0x48, 0x80000) bind$netrom(r1, &(0x7f0000001480)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 08:33:45 executing program 0: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x80045300, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x80182) 08:33:45 executing program 2: socket(0x0, 0x3, 0x401) 08:33:45 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 3: sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x890}, 0x4000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:45 executing program 2: socket(0x0, 0x3, 0x401) 08:33:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:45 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:45 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:46 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x151400, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="68c06260ed35b6bdbb5b5361c8b5303be59bb39e1a80e3ecf0d0dd70dd1b008000001400000800bd7000fcdbdf250a3f89", @ANYRES32=0x0, @ANYBLOB="14000200fc00000000000000000000000000000114000600ff27000003000000010000000000000000000000000000fbff1300060020000000000001000001000020000000"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c010) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x4, 0x1, 0x8, 0x100, 0x40, @mcast1, @private2, 0x0, 0x700, 0x7, 0xfffffff9}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x515000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000000c0)) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'syztnl2\x00', r4, 0x4, 0x6f, 0x0, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0xc}, 0x10, 0x40, 0x0, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'syztnl0\x00', r7, 0x29, 0xea, 0x7f, 0x80000001, 0x8, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x40, 0x5, 0x4}}) 08:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:46 executing program 2: socket(0x2c, 0x0, 0x401) 08:33:46 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 2: socket(0x2c, 0x0, 0x401) 08:33:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:46 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syz_tun\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x884) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:46 executing program 2: socket(0x2c, 0x0, 0x401) 08:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = eventfd(0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) r8 = eventfd(0x80000001) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, 0x0) io_submit(r1, 0x6, &(0x7f0000001600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0xffff, r2, &(0x7f00000000c0)="4fd9c07182aa1544740e937373737c5146174489dd1bb1d576cb335ed33009673db2bde201ec0ada71cb9b40f2bd19040016dec65b8ebe6147ac057473e52f3c687feefcd0c2ee10ffa5949ca23ffe95db8afe36bc758e7135850544b2403cb3b01eacbcdd473c6c1a155c05eda4ba267077e403f24ae6c8497148e17e6a89985ddee22d0ac6b3d550a691be802db8b812148ace", 0x94, 0x9, 0x0, 0x2, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x8f, r4, &(0x7f0000000200)="7035fa5f63e5958d85c611499327624503694e291fbc389123019e36566202521f4955be63fd1683564c2072f39a02a995cd53b9fd93714f2f1272bc8a13f6e8f23b00a9ab83016e3a0047c858d9430b1afb79510b73d0db7d223e6339e03c981739341197a927c6", 0x68, 0xe581, 0x0, 0x1, r5}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x2, 0x791, r0, &(0x7f00000002c0)="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", 0x1000, 0x5, 0x0, 0x2, r6}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x8, 0x6, 0xffffffffffffffff, &(0x7f0000001300)="10172f890095e953dde2289317a052e752d7f35d4e7c4101ec20443f2f42726cf4937728d06fb9507574f4fbede84588a0068c637849c51c9acc6261e8edea48f5b98275baee13f4b9cb7958c77c9f38fa50a01783c17ab992ceda3472df38ef8a8700de2d6ff4687bce8292b26ea4716a78592d542aa1dfca66aa96ffa4fb70b8b26b859a4bc8b0702191bb44290b2d3ae084c0fb49fe8f0920d05d006734c51a275d0e01400097fe8752abef287a580600ec02a5b916ff2f", 0xb9, 0x8000000000000000, 0x0, 0x0, r7}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000001400)="788d9a6eeaac9870603aa9d9eb1285fb5491855a06e83c0c9e2d6ff97e1b7de5e3ee9cb8d1efa1f1c9d83995c2d5f655fc6d1c1ad1ee256e927173ef283e3f46fb0d459545ae3c54f148cc0aeff2acb9442e5d737eb766af836301358144b27b067c61f28c45f8d19563c8a2737ed0e03ab86a6bcd13ed0f83cb1ef6d0fa9a5b13285302de5bfebb1231137566c4146d6508120f389cb1437364344565ce85b20733156cdc8ee209e085a45ce4f14404383e3a081e70", 0xb6, 0x1, 0x0, 0x2, r8}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000001500)="7536aa25b9e0cfa76d8d4fab32558e84d9a67bb3c23bf5113b499598cb7f217408c6c0b3e7d480e076d2f0691d84d48d14be0afc97b657df4d18a2efa7e5c34e9c16668a483c1ffb818b7f1126cf319c3253efe770f95532c6b7ce110a0aa2ac30dd046223a88849a0ddef6c1b3045409f66f5d11f1e7b6a7beff566b2355cb42c7c2a16720eaf53d7e2de435ec9a695128d825a146cac9c2f9207e71d50", 0x9e, 0x40, 0x0, 0x3, r9}]) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f0000001680)={0x7c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2400c050}, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syz_tun\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x884) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:46 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 3: ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000100)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x30782, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_cancel(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) io_cancel(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x400, r4, &(0x7f0000000240)="0c76a3d9f014f241fc6bfb21dedbddbffe4abc5e7880844533c1758320a0966592fcea41924197d58a79b0aeec67d5e1b894e7819c83f36592b7dad2a19c36940efeb25b722f15b9554d80c0f8d49ebd043a0b74f1764f132695383d600b873b6957bf8ecc2cf61c797bc1f593a80770b0b555d9e44a481509994e87211d7c4790540859b189129536d1bf4613ec1b480240263c4e950d9026b6896381abfe5b24bc61ae78d1c54c00a0844888f7164354c96a4e24fff2b7494a77302d7d0e733ebfbebf6207468fe84ab4a9db44bc15dad2b7dadc35278dcc46582f6b19f0742ee85c8c032c0a76", 0xe8, 0x0, 0x0, 0x1}, &(0x7f0000000380)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6gre0\x00', r5, 0x0, 0x0, 0x70, 0x5, 0x5a, @private2, @mcast1, 0x7800, 0x7800, 0x401, 0x2}}) 08:33:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = eventfd(0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) r8 = eventfd(0x80000001) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, 0x0) io_submit(r1, 0x6, &(0x7f0000001600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0xffff, r2, &(0x7f00000000c0)="4fd9c07182aa1544740e937373737c5146174489dd1bb1d576cb335ed33009673db2bde201ec0ada71cb9b40f2bd19040016dec65b8ebe6147ac057473e52f3c687feefcd0c2ee10ffa5949ca23ffe95db8afe36bc758e7135850544b2403cb3b01eacbcdd473c6c1a155c05eda4ba267077e403f24ae6c8497148e17e6a89985ddee22d0ac6b3d550a691be802db8b812148ace", 0x94, 0x9, 0x0, 0x2, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x8f, r4, &(0x7f0000000200)="7035fa5f63e5958d85c611499327624503694e291fbc389123019e36566202521f4955be63fd1683564c2072f39a02a995cd53b9fd93714f2f1272bc8a13f6e8f23b00a9ab83016e3a0047c858d9430b1afb79510b73d0db7d223e6339e03c981739341197a927c6", 0x68, 0xe581, 0x0, 0x1, r5}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x2, 0x791, r0, &(0x7f00000002c0)="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", 0x1000, 0x5, 0x0, 0x2, r6}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x8, 0x6, 0xffffffffffffffff, &(0x7f0000001300)="10172f890095e953dde2289317a052e752d7f35d4e7c4101ec20443f2f42726cf4937728d06fb9507574f4fbede84588a0068c637849c51c9acc6261e8edea48f5b98275baee13f4b9cb7958c77c9f38fa50a01783c17ab992ceda3472df38ef8a8700de2d6ff4687bce8292b26ea4716a78592d542aa1dfca66aa96ffa4fb70b8b26b859a4bc8b0702191bb44290b2d3ae084c0fb49fe8f0920d05d006734c51a275d0e01400097fe8752abef287a580600ec02a5b916ff2f", 0xb9, 0x8000000000000000, 0x0, 0x0, r7}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000001400)="788d9a6eeaac9870603aa9d9eb1285fb5491855a06e83c0c9e2d6ff97e1b7de5e3ee9cb8d1efa1f1c9d83995c2d5f655fc6d1c1ad1ee256e927173ef283e3f46fb0d459545ae3c54f148cc0aeff2acb9442e5d737eb766af836301358144b27b067c61f28c45f8d19563c8a2737ed0e03ab86a6bcd13ed0f83cb1ef6d0fa9a5b13285302de5bfebb1231137566c4146d6508120f389cb1437364344565ce85b20733156cdc8ee209e085a45ce4f14404383e3a081e70", 0xb6, 0x1, 0x0, 0x2, r8}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000001500)="7536aa25b9e0cfa76d8d4fab32558e84d9a67bb3c23bf5113b499598cb7f217408c6c0b3e7d480e076d2f0691d84d48d14be0afc97b657df4d18a2efa7e5c34e9c16668a483c1ffb818b7f1126cf319c3253efe770f95532c6b7ce110a0aa2ac30dd046223a88849a0ddef6c1b3045409f66f5d11f1e7b6a7beff566b2355cb42c7c2a16720eaf53d7e2de435ec9a695128d825a146cac9c2f9207e71d50", 0x9e, 0x40, 0x0, 0x3, r9}]) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f0000001680)={0x7c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2400c050}, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:47 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:47 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 5: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:47 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:47 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:33:47 executing program 5: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) 08:33:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:47 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:47 executing program 5: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:47 executing program 2: socket(0x2c, 0x3, 0x0) 08:33:47 executing program 5: socket(0x0, 0x3, 0x0) 08:33:47 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2880, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000080)={0xe9, 0x5, 0x2, 0x6}, 0x10) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) clock_gettime(0x1, &(0x7f0000000040)) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0), 0x8800, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x1) 08:33:48 executing program 2: socket(0x0, 0x3, 0x0) 08:33:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:48 executing program 5: socket(0x0, 0x3, 0x0) 08:33:48 executing program 2: socket(0x0, 0x3, 0x0) 08:33:48 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) 08:33:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r2, &(0x7f0000001800)={&(0x7f0000000140)=@qipcrtr, 0x80, &(0x7f0000001640)=[{&(0x7f00000001c0)=""/197, 0xc5}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000300)=""/34, 0x22}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/27, 0x1b}, {&(0x7f0000001380)=""/112, 0x70}, {&(0x7f0000001400)=""/202, 0xca}, {&(0x7f0000001500)=""/32, 0x20}, {&(0x7f0000001540)=""/186, 0xba}, {&(0x7f0000001600)=""/33, 0x21}], 0xa, &(0x7f0000001700)=""/246, 0xf6}, 0x10020) eventfd(0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400ff87", @ANYRES16=0x0, @ANYRESHEX=r1], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40c0) 08:33:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r2, &(0x7f0000001800)={&(0x7f0000000140)=@qipcrtr, 0x80, &(0x7f0000001640)=[{&(0x7f00000001c0)=""/197, 0xc5}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000300)=""/34, 0x22}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/27, 0x1b}, {&(0x7f0000001380)=""/112, 0x70}, {&(0x7f0000001400)=""/202, 0xca}, {&(0x7f0000001500)=""/32, 0x20}, {&(0x7f0000001540)=""/186, 0xba}, {&(0x7f0000001600)=""/33, 0x21}], 0xa, &(0x7f0000001700)=""/246, 0xf6}, 0x10020) eventfd(0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400ff87", @ANYRES16=0x0, @ANYRESHEX=r1], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40c0) 08:33:48 executing program 2: socket(0x0, 0x3, 0x0) 08:33:48 executing program 5: socket(0x0, 0x3, 0x0) 08:33:48 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) 08:33:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:48 executing program 2: socket(0x2c, 0x0, 0x0) 08:33:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x24}}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x19, 0x0, 0x0) 08:33:48 executing program 5: socket(0x2c, 0x0, 0x0) 08:33:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:48 executing program 2: socket(0x2c, 0x0, 0x0) 08:33:48 executing program 5: socket(0x2c, 0x0, 0x0) 08:33:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 2: socket(0x2c, 0x0, 0x0) 08:33:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 5: socket(0x2c, 0x0, 0x0) 08:33:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x280480, 0x0) 08:33:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:50 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200100, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d1a, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x581400, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) 08:33:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:51 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200100, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d1a, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x581400, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) 08:33:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 08:33:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) 08:33:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x11, 0xa, 0xffff7fff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:33:52 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x11, 0xa, 0xffff7fff) 08:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 3: socket(0x11, 0xa, 0xffff7fff) 08:33:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:53 executing program 3: socket(0x0, 0xa, 0xffff7fff) 08:33:53 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x11, 0xa, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 1: r0 = socket(0x11, 0xa, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 3: socket(0x0, 0xa, 0xffff7fff) 08:33:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 1: r0 = socket(0x0, 0xa, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r2 = socket(0x1d, 0x6, 0x8) accept4$netrom(r2, &(0x7f00000003c0)={{0x3, @netrom}, [@rose, @null, @rose, @default, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:53 executing program 3: socket(0x0, 0xa, 0xffff7fff) 08:33:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:54 executing program 1: r0 = socket(0x0, 0xa, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r2 = socket(0x1d, 0x6, 0x8) accept4$netrom(r2, &(0x7f00000003c0)={{0x3, @netrom}, [@rose, @null, @rose, @default, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 3: socket(0x11, 0x0, 0xffff7fff) 08:33:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:54 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r2 = socket(0x1d, 0x6, 0x8) accept4$netrom(r2, &(0x7f00000003c0)={{0x3, @netrom}, [@rose, @null, @rose, @default, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:54 executing program 1: r0 = socket(0x0, 0xa, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:54 executing program 3: socket(0x11, 0x0, 0xffff7fff) 08:33:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:54 executing program 3: socket(0x11, 0x0, 0xffff7fff) 08:33:54 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r1 = socket(0x1d, 0x6, 0x8) accept4$netrom(r1, &(0x7f00000003c0)={{0x3, @netrom}, [@rose, @null, @rose, @default, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48, 0x0) 08:33:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 1: r0 = socket(0x11, 0x0, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:54 executing program 3: socket(0x11, 0xa, 0x0) 08:33:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) socket(0x1d, 0x6, 0x8) 08:33:54 executing program 1: r0 = socket(0x11, 0x0, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1d, 0x6, 0x8) 08:33:55 executing program 1: r0 = socket(0x11, 0x0, 0xffff7fff) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:55 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket(0x1d, 0x6, 0x8) 08:33:55 executing program 1: r0 = socket(0x11, 0xa, 0x0) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 1: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:55 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1ba100, 0x0) socket(0x1d, 0x6, 0x8) 08:33:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:55 executing program 1: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:55 executing program 2: socket(0x1d, 0x6, 0x8) 08:33:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000100)={0xe4, 0x1000}) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, &(0x7f00000000c0)=0xbbe) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x80002) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000180)={{0x0, 0x4b}, {0x7, 0x4}, 0x20, 0x6}) 08:33:56 executing program 2: socket(0x0, 0x6, 0x8) 08:33:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:56 executing program 1: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) 08:33:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 08:33:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:56 executing program 2: socket(0x0, 0x6, 0x8) 08:33:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:56 executing program 1: r0 = socket(0x11, 0xa, 0x0) bind$pptp(r0, 0x0, 0x0) 08:33:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 08:33:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:56 executing program 2: socket(0x0, 0x6, 0x8) 08:33:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r4, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000040)="96fddbe81706e70d42f870291fb4b139a868923f2f1c82c48785c551851bb1d48dbe5e59036ba4352adec08cb9718c72ce886756d4a2583e72d6ade481ee2e928d06e6491952cefde0d0ab3f7d01a26d007de7e87eed89025a3f1beb94004fb6a959e0e6d05c2f8f57aa5bbbb6c774d63fd6a0e4390b0153324f194f844c36bec80157c6d7a747f28481a14f5b6abf5a15969489eda619d70dfc91b78272a35d8fee92394abd14401e8f660f5314", &(0x7f0000000100)=@tcp6=r3, 0x2}, 0x20) 08:33:56 executing program 1: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000080)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/net\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 08:33:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:33:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r4, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000040)="96fddbe81706e70d42f870291fb4b139a868923f2f1c82c48785c551851bb1d48dbe5e59036ba4352adec08cb9718c72ce886756d4a2583e72d6ade481ee2e928d06e6491952cefde0d0ab3f7d01a26d007de7e87eed89025a3f1beb94004fb6a959e0e6d05c2f8f57aa5bbbb6c774d63fd6a0e4390b0153324f194f844c36bec80157c6d7a747f28481a14f5b6abf5a15969489eda619d70dfc91b78272a35d8fee92394abd14401e8f660f5314", &(0x7f0000000100)=@tcp6=r3, 0x2}, 0x20) 08:33:56 executing program 2: socket(0x1d, 0x0, 0x8) 08:33:56 executing program 4: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000080)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/net\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:56 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:56 executing program 2: socket(0x1d, 0x0, 0x0) 08:33:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:33:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r4, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000040)="96fddbe81706e70d42f870291fb4b139a868923f2f1c82c48785c551851bb1d48dbe5e59036ba4352adec08cb9718c72ce886756d4a2583e72d6ade481ee2e928d06e6491952cefde0d0ab3f7d01a26d007de7e87eed89025a3f1beb94004fb6a959e0e6d05c2f8f57aa5bbbb6c774d63fd6a0e4390b0153324f194f844c36bec80157c6d7a747f28481a14f5b6abf5a15969489eda619d70dfc91b78272a35d8fee92394abd14401e8f660f5314", &(0x7f0000000100)=@tcp6=r3, 0x2}, 0x20) 08:33:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 2673.130053][ T3876] can_create: 5 callbacks suppressed [ 2673.130071][ T3876] can: request_module (can-proto-0) failed. 08:33:57 executing program 2: socket(0x1d, 0x0, 0x0) 08:33:57 executing program 1: socket(0x1d, 0x0, 0x0) 08:33:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r4, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) 08:33:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:57 executing program 1: socket(0x1d, 0x0, 0x0) [ 2673.398700][ T3891] can: request_module (can-proto-0) failed. [ 2673.406193][ T3893] can: request_module (can-proto-0) failed. 08:33:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000800)={'syztnl0\x00', &(0x7f0000000780)={'ip6gre0\x00', r3, 0x2f, 0x81, 0x7, 0x40, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x700, 0x40, 0x5f, 0xa7}}) 08:33:57 executing program 2: socket(0x1d, 0x0, 0x0) 08:33:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) [ 2673.604404][ T3906] can: request_module (can-proto-0) failed. 08:33:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x4, 0x599, 0x2, @private1, @remote, 0x1, 0x7800, 0x0, 0xffffffff}}) 08:33:57 executing program 1: socket(0x1d, 0x0, 0x0) [ 2673.665724][ T3911] can: request_module (can-proto-0) failed. 08:33:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:33:57 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 08:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) [ 2673.897277][ T3922] can: request_module (can-proto-0) failed. 08:33:58 executing program 1: socket(0x0, 0x0, 0x0) 08:33:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) socket$inet6_udplite(0xa, 0x2, 0x88) 08:33:58 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040), 0x4) 08:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) 08:33:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 08:33:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) socket$inet6_udplite(0xa, 0x2, 0x88) 08:33:58 executing program 1: socket(0x0, 0x0, 0x0) 08:33:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) 08:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 08:33:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) 08:33:58 executing program 1: socket(0x0, 0x0, 0x0) 08:33:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000080), 0x8) 08:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 08:33:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 08:33:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) 08:33:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:33:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000080), 0x8) 08:33:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 4: io_setup(0x8, &(0x7f0000000040)) io_setup(0x7f, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x40000000000002, 0x1, &(0x7f0000000080)=[{}], &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x1ff]}, 0x8}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 08:33:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:33:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000080), 0x8) 08:33:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:33:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) socket$vsock_stream(0x28, 0x1, 0x0) 08:33:59 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, 0x0) 08:33:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:33:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/147, 0x93, 0x100, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@netrom, @default, @bcast, @bcast, @bcast, @remote, @null, @null]}, &(0x7f00000002c0)=0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000380)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x3, 0x5, 0x0, @empty, @mcast2, 0x8, 0x7, 0x6, 0x7}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001100080029bd7000fbdbdf2507000000c50620c1b1f0fb1eb533f366e04b12bd33d38ba1b6d34839f746e87724c024a1", @ANYRES32=r3, @ANYBLOB="000000000000000014002b80080003000200000008000800", @ANYRES32=r4, @ANYBLOB="08002e0002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8050}, 0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:33:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) 08:33:59 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) socket$vsock_stream(0x28, 0x1, 0x0) 08:33:59 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x2) 08:33:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:33:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:33:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) 08:33:59 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) socket$vsock_stream(0x28, 0x1, 0x0) 08:33:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/147, 0x93, 0x100, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@netrom, @default, @bcast, @bcast, @bcast, @remote, @null, @null]}, &(0x7f00000002c0)=0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000380)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x3, 0x5, 0x0, @empty, @mcast2, 0x8, 0x7, 0x6, 0x7}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001100080029bd7000fbdbdf2507000000c50620c1b1f0fb1eb533f366e04b12bd33d38ba1b6d34839f746e87724c024a1", @ANYRES32=r3, @ANYBLOB="000000000000000014002b80080003000200000008000800", @ANYRES32=r4, @ANYBLOB="08002e0002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8050}, 0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:33:59 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x105000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x73c}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfffa}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080}, 0x804) 08:34:00 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:34:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) socket$vsock_stream(0x28, 0x1, 0x0) 08:34:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 08:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:34:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/147, 0x93, 0x100, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@netrom, @default, @bcast, @bcast, @bcast, @remote, @null, @null]}, &(0x7f00000002c0)=0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000380)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x3, 0x5, 0x0, @empty, @mcast2, 0x8, 0x7, 0x6, 0x7}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001100080029bd7000fbdbdf2507000000c50620c1b1f0fb1eb533f366e04b12bd33d38ba1b6d34839f746e87724c024a1", @ANYRES32=r3, @ANYBLOB="000000000000000014002b80080003000200000008000800", @ANYRES32=r4, @ANYBLOB="08002e0002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8050}, 0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:34:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) getpeername$netrom(r3, &(0x7f0000000180)={{0x3, @rose}, [@null, @rose, @default, @remote, @null, @null, @netrom, @netrom]}, &(0x7f0000000200)=0x48) 08:34:00 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:34:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:34:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 08:34:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 08:34:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:00 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:34:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@default, @null, @default, @remote, @netrom, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x48) 08:34:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x204080, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 08:34:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 08:34:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:00 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000)=0x400, 0x4) 08:34:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 08:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000)=0x400, 0x4) 08:34:01 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = gettid() waitid(0x1, r0, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r0, &(0x7f0000000240)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000)=0x400, 0x4) 08:34:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:01 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = gettid() waitid(0x1, r0, &(0x7f0000000b00), 0x4, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000)=0x400, 0x4) 08:34:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r1, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:01 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) gettid() r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, 0x0) 08:34:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x4, 0x1e, 0x3, 0x2, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7800, 0x7800, 0x6, 0xffff8000}}) 08:34:01 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = gettid() waitid(0x1, r0, &(0x7f0000000b00), 0x4, 0x0) sched_rr_get_interval(r0, &(0x7f0000000240)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, 0x0) 08:34:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 08:34:01 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = gettid() waitid(0x1, r0, &(0x7f0000000b00), 0x4, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:01 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, 0x0) 08:34:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) gettid() r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:02 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), 0x4) 08:34:02 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) gettid() r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) 08:34:02 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) 08:34:02 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:02 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) 08:34:02 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:03 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:03 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) 08:34:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:03 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:03 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x9, 0x0, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, 0x20, 0x20, 0xfffeffff, 0x6}}) openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:03 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) 08:34:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) 08:34:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:03 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:03 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) 08:34:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 08:34:03 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:03 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x88841, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) 08:34:04 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) 08:34:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 08:34:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20900, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)) 08:34:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 08:34:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 08:34:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:34:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:34:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:05 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:05 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) 08:34:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) 08:34:05 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:05 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:05 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 08:34:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 08:34:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:34:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:05 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:34:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) 08:34:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) 08:34:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() 08:34:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:06 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) fork() 08:34:06 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x6, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:07 executing program 2: fork() 08:34:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x8, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:07 executing program 2: fork() 08:34:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x8, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}]}) 08:34:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 08:34:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:07 executing program 2: fork() 08:34:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x7, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}]}) 08:34:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 08:34:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}]}) 08:34:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 08:34:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote, 0x64, 0x8000, 0x20}}) 08:34:07 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:08 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x5, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}]}) 08:34:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote, 0x0, 0x8000, 0x20}}) 08:34:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:08 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, 0x0, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:08 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote, 0x0, 0x0, 0x20}}) 08:34:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x4, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}]}) 08:34:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:08 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, 0x0, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote}}) 08:34:08 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x3, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}]}) 08:34:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:08 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, 0x0, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:08 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() 08:34:08 executing program 1: fork() 08:34:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:08 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) fork() 08:34:09 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() [ 2685.030560][ T26] audit: type=1326 audit(1635064449.081:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4538 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x8, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}]}) 08:34:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:09 executing program 1: fork() 08:34:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:09 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x7, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}]}) 08:34:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) [ 2685.349005][ T26] audit: type=1326 audit(1635064449.401:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4561 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:09 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 08:34:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}]}) [ 2685.674059][ T26] audit: type=1326 audit(1635064449.721:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4576 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x5, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}]}) 08:34:09 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') [ 2685.966546][ T26] audit: type=1326 audit(1635064450.021:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4592 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x4, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}]}) 08:34:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:10 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x3, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}]}) 08:34:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}]}) 08:34:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:10 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}]}) 08:34:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}]}) 08:34:10 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) [ 2686.734274][ T26] audit: type=1326 audit(1635064450.781:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4630 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 08:34:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:10 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}]}) 08:34:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}]}) 08:34:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) 08:34:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) [ 2687.491331][ T26] audit: type=1326 audit(1635064451.541:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4671 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) [ 2687.721339][ T26] audit: type=1326 audit(1635064451.771:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4683 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) [ 2687.999198][ T26] audit: type=1326 audit(1635064452.051:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4695 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:34:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}]}) 08:34:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x5, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}]}) 08:34:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x4, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}]}) 08:34:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x3, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}]}) 08:34:13 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) [ 2688.944544][ T26] audit: type=1326 audit(1635064453.001:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4747 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) [ 2689.162400][ T26] audit: type=1326 audit(1635064453.211:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4759 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 2690.086212][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 2690.086231][ T26] audit: type=1326 audit(1635064454.131:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4805 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x3f, 0x6}]}) 08:34:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 2690.326237][ T26] audit: type=1326 audit(1635064454.381:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4819 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2690.524120][ T26] audit: type=1326 audit(1635064454.571:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4832 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) [ 2690.612072][ T26] audit: type=1326 audit(1635064454.611:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4833 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2690.741822][ T26] audit: type=1326 audit(1635064454.791:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4842 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) [ 2690.862731][ T26] audit: type=1326 audit(1635064454.881:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4845 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}]}) 08:34:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2691.034803][ T26] audit: type=1326 audit(1635064455.092:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4854 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) [ 2691.188811][ T26] audit: type=1326 audit(1635064455.112:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4856 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) [ 2691.316086][ T26] audit: type=1326 audit(1635064455.292:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4867 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 [ 2691.338679][ T26] audit: type=1326 audit(1635064455.322:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4868 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f}]}) 08:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x0, 0x6}]}) 08:34:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f}]}) 08:34:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f}]}) 08:34:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f}]}) 08:34:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f}]}) 08:34:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f}]}) 08:34:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x0, 0x6}]}) 08:34:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x0, 0x6}]}) 08:34:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x0, 0x3, 0x0, 0x6}]}) 08:34:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) [ 2695.133013][ T26] kauditd_printk_skb: 50 callbacks suppressed [ 2695.133030][ T26] audit: type=1326 audit(1635064459.182:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5078 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 08:34:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x0, 0x0, 0x0, 0x6}]}) [ 2695.279988][ T26] audit: type=1326 audit(1635064459.272:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5081 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 08:34:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2695.408311][ T26] audit: type=1326 audit(1635064459.362:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5086 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 [ 2695.431124][ T26] audit: type=1326 audit(1635064459.462:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5090 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 08:34:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) [ 2695.657886][ T26] audit: type=1326 audit(1635064459.512:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5088 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe908ebba39 code=0x0 [ 2695.680777][ T26] audit: type=1326 audit(1635064459.572:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5097 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 08:34:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) [ 2695.703149][ T26] audit: type=1326 audit(1635064459.592:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5095 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84744f0a39 code=0x0 [ 2695.725530][ T26] audit: type=1326 audit(1635064459.692:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5103 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe908ebba39 code=0x0 08:34:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6}]}) 08:34:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) [ 2695.848586][ T26] audit: type=1326 audit(1635064459.822:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5104 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 [ 2695.871621][ T26] audit: type=1326 audit(1635064459.832:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5109 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 08:34:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6}]}) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6}]}) 08:34:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6}]}) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6}]}) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {}]}) 08:34:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {}]}) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {}]}) 08:34:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3}]}) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {}]}) 08:34:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {}]}) 08:34:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3}, {}]}) 08:34:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}]}) 08:34:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x3f, 0x6}]}) 08:34:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2700.182017][ T26] kauditd_printk_skb: 45 callbacks suppressed [ 2700.182036][ T26] audit: type=1326 audit(1635064464.232:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5383 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 08:34:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x3, 0x3f, 0x6}]}) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2700.265460][ T26] audit: type=1326 audit(1635064464.312:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5387 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2700.395846][ T26] audit: type=1326 audit(1635064464.412:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5389 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 [ 2700.418537][ T26] audit: type=1326 audit(1635064464.412:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5394 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6f9004ea39 code=0x0 08:34:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}]}) 08:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) [ 2700.613300][ T26] audit: type=1326 audit(1635064464.592:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5402 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) [ 2700.732304][ T26] audit: type=1326 audit(1635064464.692:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5408 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2700.767371][ T26] audit: type=1326 audit(1635064464.822:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5416 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:24 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) [ 2700.882672][ T26] audit: type=1326 audit(1635064464.852:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5418 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe908ebba39 code=0x0 [ 2700.905349][ T26] audit: type=1326 audit(1635064464.902:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 08:34:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}, {0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) [ 2701.119854][ T26] audit: type=1326 audit(1635064465.102:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5431 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f47491caa39 code=0x0 08:34:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', 0x0}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x3f, 0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', 0x0}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{}]}) 08:34:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', 0x0}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}]}) 08:34:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x0, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) 08:34:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x3, 0x3f, 0x6}]}) 08:34:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:34:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x0, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x3, 0x3f, 0x6}]}) 08:34:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) 08:34:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x0, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:34:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x3, 0x3f, 0x6}]}) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x3f, 0x6}]}) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x0, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 08:34:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}) 08:34:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x0, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 08:34:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x0, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) 08:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) 08:34:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x0, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) fork() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) 08:34:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x0, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:34:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}]}) 08:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 08:34:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x0, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x0, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x0, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x0, 0x0, 0x0, 0x6}]}) 08:34:28 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x1f, 0x6}, {0x6}]}) 08:34:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 08:34:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x0, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}, {0x6}]}) 08:34:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:29 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getlink={0x28, 0x12, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x1310, 0x2814}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x8139}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x11) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:34:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = fork() r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWNSID={0x5c, 0x58, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r0}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008085) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x3, 0x0, 0x1f, 0x6}, {0x6, 0x3, 0x3f, 0x6}, {0x7, 0x5, 0x1, 0x200}, {0x3ff, 0x0, 0x6, 0x1000}, {0x672e, 0x4, 0xff, 0x7}, {0x400, 0x97, 0x1f, 0x9}, {0x5, 0x1, 0x29, 0x7fff}, {0x7, 0x1f, 0x4, 0x7fffffff}, {0x5, 0x83, 0x9, 0x60000}]}) 08:34:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2705.200790][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 2705.200809][ T26] audit: type=1326 audit(1635064469.252:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5664 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) 08:34:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x8, 0xfffffffa, 0x92, 0x8, 0x48, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x8, 0x101, 0xb2e3, 0x1, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_ext={0x1c, 0xc, &(0x7f0000000540)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x8, 0xeb, &(0x7f0000000700)=""/235, 0x41000, 0x1b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x6, 0x3}, 0x10, 0x85dd}, 0x78) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), r3) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r5, &(0x7f0000000900)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80000000}, 0xc) io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x7, r2, &(0x7f00000000c0)="ae99fd1b999730d224dae33a2b1fc748a691d75efa93ec110e0bfbc797497318076ef6f582118186da405bcae80b9b3471caa60000228fce2e8ec6bb437610cb2aee1f5ee4020012f69931b88940d698c293527dec380014626fcde6cad2a00b896fc91da43c250e295aff3960d058d6db8c1a2e9278951fa3fa90981cbf7d4a9481605f0eb54115ef7f7ecd4ab78d4fe09001370900388ccbd933c39b90a166c2a76c5d7be591d6370722e7cf8828488ac888c45a6f9f952d83c46139ea50925f5968501c2e458d1c394c2fde3ec7d9183a2ebf7cf0d095e4f394ab155de76e368d1f20", 0xe4, 0x1, 0x0, 0x2, r1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0xfffd, r1, &(0x7f0000000200)="af89ea1528f4ee3899c61113bd36cdc6b7cac952dce0a21728fdb7c4076511e2", 0x20, 0x8, 0x0, 0x0, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x582, r4, &(0x7f0000000280)="e2780670497806b5fa088543b5dbf7c14483391b7a9041c639c2c7ff6de4db2397d12dfc73569005f13b12f7e8d0d8bf0966f22819bf97c0c424ad31e016bab995c8c9e9459e39faebdbc1", 0x4b, 0x5, 0x0, 0x0, r1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x6, r0, &(0x7f0000000340)="d2407a3fa995852b47f9b4ae8ae8c5e9971dcc3bd5347f5f3763b3b29020c8f19080ccb724db2d1f34f81e20bee47a026110511ac58c76591324ad9fcad1b795f21d6b53e4bea844eea7bea2166a33dc5a7d00c1c8df15be63556580967a60af6bc675f278bbf3737a17c45063cd10c4e16e2cba523f4b00a4662987112569a336d547a1b968ed5dee09b5716d2a130bcbe9bac0470d978c6c599d91552a16780b539f83db58255ee6364ae686f715ce5e40b2fae4028f06196f3bfce161faf5f6801c3f35ae14d98f15434e87342f46fc66ff67402dd42edfd295b33f70a6085d13f9ddbb5feddbe1ac406657104f83a42957ed77892da0", 0xf8, 0x9, 0x0, 0x0, r1}]) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000880), &(0x7f00000008c0)=0x4) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000002940), 0x80002, 0x0) connect$pptp(r7, &(0x7f0000002980)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) 08:34:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, 0x0) 08:34:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) [ 2705.463800][ T26] audit: type=1326 audit(1635064469.513:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5681 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x6}, {0x6}]}) 08:34:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) socket$netlink(0x10, 0x3, 0xb) 08:34:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 08:34:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, 0x0) 08:34:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:29 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) [ 2705.713083][ T26] audit: type=1326 audit(1635064469.753:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5691 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, 0x0) 08:34:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 2705.990879][ T26] audit: type=1326 audit(1635064470.033:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5710 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x8, 0x169a7f03, 0x4f, @private1, @private1, 0x7800, 0x40, 0x8, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', r2, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) 08:34:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) (fail_nth: 1) 08:34:30 executing program 5: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 08:34:30 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) [ 2706.292011][ T5729] FAULT_INJECTION: forcing a failure. [ 2706.292011][ T5729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2706.305415][ T5729] CPU: 1 PID: 5729 Comm: syz-executor.2 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2706.315335][ T5729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2706.325407][ T5729] Call Trace: [ 2706.328704][ T5729] [ 2706.331642][ T5729] dump_stack_lvl+0xcd/0x134 [ 2706.336267][ T5729] should_fail.cold+0x5/0xa 08:34:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x8, 0x169a7f03, 0x4f, @private1, @private1, 0x7800, 0x40, 0x8, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', r2, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) [ 2706.341275][ T5729] _copy_from_user+0x2c/0x180 [ 2706.346152][ T5729] do_seccomp+0x1cc/0x2890 [ 2706.350603][ T5729] ? __context_tracking_exit+0xb8/0xe0 [ 2706.356088][ T5729] ? lock_downgrade+0x6e0/0x6e0 [ 2706.360964][ T5729] ? __seccomp_filter+0x1040/0x1040 [ 2706.366204][ T5729] ? syscall_enter_from_user_mode+0x21/0x70 [ 2706.372133][ T5729] do_syscall_64+0x35/0xb0 [ 2706.376577][ T5729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2706.382499][ T5729] RIP: 0033:0x7fe0f6d99a39 08:34:30 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) [ 2706.386930][ T5729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2706.406565][ T5729] RSP: 002b:00007fe0f430f188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2706.415002][ T5729] RAX: ffffffffffffffda RBX: 00007fe0f6e9cf60 RCX: 00007fe0f6d99a39 [ 2706.423003][ T5729] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000001 [ 2706.430998][ T5729] RBP: 00007fe0f430f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2706.438990][ T5729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2706.446980][ T5729] R13: 00007fff1383dedf R14: 00007fe0f430f300 R15: 0000000000022000 [ 2706.454989][ T5729] 08:34:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 08:34:30 executing program 5: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 08:34:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x8, 0x169a7f03, 0x4f, @private1, @private1, 0x7800, 0x40, 0x8, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', r2, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:30 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) 08:34:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 08:34:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) (fail_nth: 2) 08:34:31 executing program 5: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 08:34:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) 08:34:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 08:34:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) [ 2707.236137][ T5782] FAULT_INJECTION: forcing a failure. [ 2707.236137][ T5782] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.248916][ T5782] CPU: 1 PID: 5782 Comm: syz-executor.2 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2707.258837][ T5782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2707.268905][ T5782] Call Trace: [ 2707.272180][ T5782] [ 2707.275118][ T5782] dump_stack_lvl+0xcd/0x134 [ 2707.279723][ T5782] should_fail.cold+0x5/0xa [ 2707.284231][ T5782] ? do_seccomp+0x338/0x2890 [ 2707.288822][ T5782] should_failslab+0x5/0x10 [ 2707.293329][ T5782] kmem_cache_alloc_trace+0x55/0x2c0 [ 2707.298630][ T5782] do_seccomp+0x338/0x2890 [ 2707.303049][ T5782] ? __context_tracking_exit+0xb8/0xe0 [ 2707.308511][ T5782] ? lock_downgrade+0x6e0/0x6e0 [ 2707.313367][ T5782] ? __seccomp_filter+0x1040/0x1040 [ 2707.318579][ T5782] ? syscall_enter_from_user_mode+0x21/0x70 [ 2707.324660][ T5782] do_syscall_64+0x35/0xb0 [ 2707.329089][ T5782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2707.334981][ T5782] RIP: 0033:0x7fe0f6d99a39 [ 2707.339394][ T5782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.358998][ T5782] RSP: 002b:00007fe0f430f188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2707.367419][ T5782] RAX: ffffffffffffffda RBX: 00007fe0f6e9cf60 RCX: 00007fe0f6d99a39 [ 2707.375393][ T5782] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000001 08:34:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) [ 2707.383358][ T5782] RBP: 00007fe0f430f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.391321][ T5782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.399284][ T5782] R13: 00007fff1383dedf R14: 00007fe0f430f300 R15: 0000000000022000 [ 2707.407265][ T5782] 08:34:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 08:34:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) (fail_nth: 3) 08:34:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:31 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) 08:34:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) [ 2707.736927][ T5799] FAULT_INJECTION: forcing a failure. [ 2707.736927][ T5799] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.749784][ T5799] CPU: 1 PID: 5799 Comm: syz-executor.2 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2707.759703][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2707.769788][ T5799] Call Trace: [ 2707.773068][ T5799] [ 2707.776012][ T5799] dump_stack_lvl+0xcd/0x134 [ 2707.780611][ T5799] should_fail.cold+0x5/0xa [ 2707.785125][ T5799] ? __get_vm_area_node.constprop.0+0xd3/0x380 [ 2707.791279][ T5799] should_failslab+0x5/0x10 [ 2707.795819][ T5799] kmem_cache_alloc_node_trace+0x59/0x310 [ 2707.801552][ T5799] __get_vm_area_node.constprop.0+0xd3/0x380 [ 2707.807536][ T5799] ? kasan_save_stack+0x1e/0x50 [ 2707.812407][ T5799] __vmalloc_node_range+0x12f/0xab0 [ 2707.817626][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2707.823238][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2707.828912][ T5799] ? ___slab_alloc+0xc41/0xfe0 [ 2707.833692][ T5799] ? lockdep_hardirqs_on+0x79/0x100 [ 2707.838903][ T5799] ? vfree_atomic+0xe0/0xe0 [ 2707.843417][ T5799] ? do_seccomp+0x338/0x2890 [ 2707.848029][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2707.853603][ T5799] __vmalloc+0x69/0x80 [ 2707.857699][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2707.863261][ T5799] bpf_prog_alloc_no_stats+0x38/0x350 [ 2707.868651][ T5799] bpf_prog_alloc+0x28/0x1a0 [ 2707.873262][ T5799] bpf_prog_create_from_user+0xb7/0x660 [ 2707.878887][ T5799] ? hardlockup_detector_perf_cleanup+0x1e0/0x1e0 [ 2707.885325][ T5799] do_seccomp+0x388/0x2890 [ 2707.889757][ T5799] ? __context_tracking_exit+0xb8/0xe0 [ 2707.895220][ T5799] ? lock_downgrade+0x6e0/0x6e0 [ 2707.900078][ T5799] ? __seccomp_filter+0x1040/0x1040 [ 2707.905289][ T5799] ? syscall_enter_from_user_mode+0x21/0x70 [ 2707.911195][ T5799] do_syscall_64+0x35/0xb0 [ 2707.915615][ T5799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2707.921526][ T5799] RIP: 0033:0x7fe0f6d99a39 [ 2707.925937][ T5799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.945542][ T5799] RSP: 002b:00007fe0f430f188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2707.953954][ T5799] RAX: ffffffffffffffda RBX: 00007fe0f6e9cf60 RCX: 00007fe0f6d99a39 [ 2707.961970][ T5799] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000001 [ 2707.969936][ T5799] RBP: 00007fe0f430f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.977900][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:34:32 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 2707.985879][ T5799] R13: 00007fff1383dedf R14: 00007fe0f430f300 R15: 0000000000022000 [ 2707.993859][ T5799] [ 2707.998871][ T5799] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 2708.016343][ T5799] CPU: 1 PID: 5799 Comm: syz-executor.2 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2708.026271][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2708.036340][ T5799] Call Trace: [ 2708.039633][ T5799] [ 2708.042570][ T5799] dump_stack_lvl+0xcd/0x134 [ 2708.047195][ T5799] warn_alloc.cold+0x87/0x17a [ 2708.051941][ T5799] ? zone_watermark_ok_safe+0x290/0x290 [ 2708.057529][ T5799] ? __kasan_kmalloc+0xbd/0xd0 [ 2708.062314][ T5799] ? __get_vm_area_node.constprop.0+0x292/0x380 [ 2708.068595][ T5799] __vmalloc_node_range+0x8e6/0xab0 [ 2708.073809][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2708.079390][ T5799] ? ___slab_alloc+0xc41/0xfe0 08:34:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2708.084175][ T5799] ? lockdep_hardirqs_on+0x79/0x100 [ 2708.089398][ T5799] ? vfree_atomic+0xe0/0xe0 [ 2708.093914][ T5799] ? do_seccomp+0x338/0x2890 [ 2708.098529][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2708.104095][ T5799] __vmalloc+0x69/0x80 [ 2708.108205][ T5799] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 2708.113772][ T5799] bpf_prog_alloc_no_stats+0x38/0x350 [ 2708.119178][ T5799] bpf_prog_alloc+0x28/0x1a0 [ 2708.123790][ T5799] bpf_prog_create_from_user+0xb7/0x660 [ 2708.129358][ T5799] ? hardlockup_detector_perf_cleanup+0x1e0/0x1e0 08:34:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:32 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) [ 2708.135808][ T5799] do_seccomp+0x388/0x2890 [ 2708.140247][ T5799] ? __context_tracking_exit+0xb8/0xe0 [ 2708.145728][ T5799] ? lock_downgrade+0x6e0/0x6e0 [ 2708.150600][ T5799] ? __seccomp_filter+0x1040/0x1040 [ 2708.155834][ T5799] ? syscall_enter_from_user_mode+0x21/0x70 [ 2708.161759][ T5799] do_syscall_64+0x35/0xb0 [ 2708.166200][ T5799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2708.172101][ T5799] RIP: 0033:0x7fe0f6d99a39 08:34:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 2708.176612][ T5799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2708.196239][ T5799] RSP: 002b:00007fe0f430f188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2708.204675][ T5799] RAX: ffffffffffffffda RBX: 00007fe0f6e9cf60 RCX: 00007fe0f6d99a39 [ 2708.212667][ T5799] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000001 [ 2708.220655][ T5799] RBP: 00007fe0f430f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2708.228643][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2708.236628][ T5799] R13: 00007fff1383dedf R14: 00007fe0f430f300 R15: 0000000000022000 [ 2708.244635][ T5799] [ 2708.248882][ T5799] Mem-Info: [ 2708.252014][ T5799] active_anon:271 inactive_anon:62586 isolated_anon:0 [ 2708.252014][ T5799] active_file:5938 inactive_file:64555 isolated_file:0 [ 2708.252014][ T5799] unevictable:768 dirty:220 writeback:0 [ 2708.252014][ T5799] slab_reclaimable:26461 slab_unreclaimable:96483 [ 2708.252014][ T5799] mapped:64141 shmem:10357 pagetables:5240 bounce:0 [ 2708.252014][ T5799] kernel_misc_reclaimable:0 [ 2708.252014][ T5799] free:1309984 free_pcp:5493 free_cma:0 [ 2708.294269][ T5799] Node 0 active_anon:1084kB inactive_anon:249552kB active_file:23636kB inactive_file:258220kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:256564kB dirty:876kB writeback:0kB shmem:38992kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 223232kB writeback_tmp:0kB kernel_stack:13900kB pagetables:21056kB all_unreclaimable? no 08:34:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x0, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:32 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) [ 2708.326174][ T5799] Node 1 active_anon:0kB inactive_anon:900kB active_file:116kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2436kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 2708.355340][ T5799] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2708.382468][ T5799] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 2708.388414][ T5799] Node 0 DMA32 free:1278328kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:1084kB inactive_anon:247464kB active_file:23636kB inactive_file:258256kB unevictable:1536kB writepending:904kB present:3129332kB managed:2716800kB mlocked:0kB bounce:0kB free_pcp:23788kB local_pcp:6516kB free_cma:0kB [ 2708.419368][ T5799] lowmem_reserve[]: 0 0 0 0 0 08:34:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 2708.424171][ T5799] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2708.450671][ T5799] lowmem_reserve[]: 0 0 0 0 0 [ 2708.455498][ T5799] Node 1 Normal free:3946248kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:0kB inactive_anon:900kB active_file:116kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2708.484527][ T5799] lowmem_reserve[]: 0 0 0 0 0 [ 2708.489269][ T5799] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 2708.502029][ T5799] Node 0 DMA32: 4*4kB (UE) 89*8kB (UE) 78*16kB (UE) 190*32kB (UE) 82*64kB (UME) 13*128kB (UM) 1*256kB (U) 1*512kB (M) 3*1024kB (UME) 1*2048kB (M) 307*4096kB (UM) = 1278328kB [ 2708.519563][ T5799] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2708.531200][ T5799] Node 1 Normal: 160*4kB (UME) 55*8kB (UME) 35*16kB (UE) 177*32kB (UME) 72*64kB (UME) 19*128kB (UME) 11*256kB (U) 4*512kB (U) 1*1024kB (U) 1*2048kB (U) 958*4096kB (ME) = 3946248kB [ 2708.549244][ T5799] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2708.558869][ T5799] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2708.568199][ T5799] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2708.577832][ T5799] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2708.587202][ T5799] 60713 total pagecache pages [ 2708.591908][ T5799] 0 pages in swap cache [ 2708.596135][ T5799] Swap cache stats: add 0, delete 0, find 0/0 [ 2708.602206][ T5799] Free swap = 0kB [ 2708.606000][ T5799] Total swap = 0kB [ 2708.609720][ T5799] 2097051 pages RAM [ 2708.613596][ T5799] 0 pages HighMem/MovableOnly [ 2708.618274][ T5799] 384506 pages reserved [ 2708.622436][ T5799] 0 pages cma reserved 08:34:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x0, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 08:34:32 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:32 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x541b, 0x0) 08:34:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x0, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x0, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:32 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) [ 2708.951091][ T26] audit: type=1326 audit(1635064472.993:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5825 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x0, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:33 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x0, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:33 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x0, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x0, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204501, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:33 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:33 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x143b40, 0x0) 08:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 08:34:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x7, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:34 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 08:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x8, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:34 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 08:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x5, 0x0, 0x0) 08:34:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xe, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:34 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x143b40, 0x0) 08:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) 08:34:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:34 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x13, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) 08:34:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:34 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) 08:34:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x21, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:35 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x3f, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, 0x0) 08:34:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x22, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x15, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, 0x0) 08:34:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x18c, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 08:34:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, 0x0) 08:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 08:34:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1c2, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xf00, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2, 0x20, 0x10, 0x2, 0x5}}) 08:34:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 1) 08:34:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) 08:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xc201, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2712.185762][ T6002] FAULT_INJECTION: forcing a failure. [ 2712.185762][ T6002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.198984][ T6002] CPU: 0 PID: 6002 Comm: syz-executor.0 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2712.208904][ T6002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2712.218978][ T6002] Call Trace: [ 2712.222269][ T6002] [ 2712.225210][ T6002] dump_stack_lvl+0xcd/0x134 [ 2712.229831][ T6002] should_fail.cold+0x5/0xa [ 2712.234365][ T6002] _copy_to_user+0x2c/0x150 [ 2712.238933][ T6002] do_seccomp+0x79d/0x2890 [ 2712.243381][ T6002] ? __context_tracking_exit+0xb8/0xe0 [ 2712.248860][ T6002] ? lock_downgrade+0x6e0/0x6e0 [ 2712.253734][ T6002] ? __seccomp_filter+0x1040/0x1040 [ 2712.258968][ T6002] ? syscall_enter_from_user_mode+0x21/0x70 [ 2712.264898][ T6002] do_syscall_64+0x35/0xb0 [ 2712.269337][ T6002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2712.275250][ T6002] RIP: 0033:0x7f47491caa39 [ 2712.279679][ T6002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2712.299306][ T6002] RSP: 002b:00007f4746740188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2712.307743][ T6002] RAX: ffffffffffffffda RBX: 00007f47492cdf60 RCX: 00007f47491caa39 [ 2712.315732][ T6002] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000003 [ 2712.323720][ T6002] RBP: 00007f47467401d0 R08: 0000000000000000 R09: 0000000000000000 08:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xec00, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2, 0x0, 0x10, 0x2, 0x5}}) 08:34:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 1) 08:34:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2712.331712][ T6002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2712.339699][ T6002] R13: 00007ffd403a9c5f R14: 00007f4746740300 R15: 0000000000022000 [ 2712.347706][ T6002] 08:34:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) [ 2712.456000][ T6011] FAULT_INJECTION: forcing a failure. [ 2712.456000][ T6011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.469345][ T6011] CPU: 1 PID: 6011 Comm: syz-executor.5 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2712.479347][ T6011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2712.489430][ T6011] Call Trace: [ 2712.492807][ T6011] [ 2712.495745][ T6011] dump_stack_lvl+0xcd/0x134 [ 2712.500367][ T6011] should_fail.cold+0x5/0xa [ 2712.504895][ T6011] _copy_from_user+0x2c/0x180 [ 2712.509601][ T6011] do_seccomp+0xad0/0x2890 [ 2712.514049][ T6011] ? __context_tracking_exit+0xb8/0xe0 [ 2712.519535][ T6011] ? lock_downgrade+0x6e0/0x6e0 [ 2712.524416][ T6011] ? __seccomp_filter+0x1040/0x1040 [ 2712.529651][ T6011] ? syscall_enter_from_user_mode+0x21/0x70 [ 2712.535571][ T6011] do_syscall_64+0x35/0xb0 [ 2712.540011][ T6011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2712.545923][ T6011] RIP: 0033:0x7f84744f0a39 [ 2712.550349][ T6011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2712.569976][ T6011] RSP: 002b:00007f8471a66188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2712.578407][ T6011] RAX: ffffffffffffffda RBX: 00007f84745f3f60 RCX: 00007f84744f0a39 [ 2712.586395][ T6011] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000002 [ 2712.594376][ T6011] RBP: 00007f8471a661d0 R08: 0000000000000000 R09: 0000000000000000 08:34:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 2) 08:34:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2712.602361][ T6011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2712.610428][ T6011] R13: 00007ffc78bae98f R14: 00007f8471a66300 R15: 0000000000022000 [ 2712.618431][ T6011] [ 2712.646222][ T6017] FAULT_INJECTION: forcing a failure. 08:34:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) [ 2712.646222][ T6017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.659479][ T6017] CPU: 1 PID: 6017 Comm: syz-executor.0 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2712.669415][ T6017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2712.679485][ T6017] Call Trace: [ 2712.682793][ T6017] [ 2712.685737][ T6017] dump_stack_lvl+0xcd/0x134 [ 2712.690356][ T6017] should_fail.cold+0x5/0xa [ 2712.694899][ T6017] _copy_to_user+0x2c/0x150 [ 2712.699432][ T6017] simple_read_from_buffer+0xcc/0x160 08:34:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) [ 2712.704852][ T6017] proc_fail_nth_read+0x187/0x220 [ 2712.709906][ T6017] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2712.715651][ T6017] ? security_file_permission+0xab/0xd0 [ 2712.721232][ T6017] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2712.726981][ T6017] vfs_read+0x1b5/0x600 [ 2712.731166][ T6017] ksys_read+0x12d/0x250 [ 2712.735434][ T6017] ? vfs_write+0xae0/0xae0 [ 2712.739873][ T6017] ? syscall_enter_from_user_mode+0x21/0x70 [ 2712.745801][ T6017] do_syscall_64+0x35/0xb0 [ 2712.750242][ T6017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2712.756155][ T6017] RIP: 0033:0x7f474917d5ec [ 2712.760588][ T6017] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2712.780214][ T6017] RSP: 002b:00007f4746740170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2712.783924][ T1193] ieee802154 phy0 wpan0: encryption failed: -22 [ 2712.788669][ T6017] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f474917d5ec [ 2712.788690][ T6017] RDX: 000000000000000f RSI: 00007f47467401e0 RDI: 0000000000000003 [ 2712.788707][ T6017] RBP: 00007f47467401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.795108][ T1193] ieee802154 phy1 wpan1: encryption failed: -22 [ 2712.802903][ T6017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2712.802921][ T6017] R13: 00007ffd403a9c5f R14: 00007f4746740300 R15: 0000000000022000 [ 2712.802956][ T6017] 08:34:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:34:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 2) 08:34:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2, 0x0, 0x0, 0x2, 0x5}}) [ 2713.043213][ T6028] FAULT_INJECTION: forcing a failure. [ 2713.043213][ T6028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2713.056501][ T6028] CPU: 0 PID: 6028 Comm: syz-executor.5 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2713.066417][ T6028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2713.076496][ T6028] Call Trace: [ 2713.079789][ T6028] [ 2713.082724][ T6028] dump_stack_lvl+0xcd/0x134 [ 2713.087345][ T6028] should_fail.cold+0x5/0xa [ 2713.091877][ T6028] _copy_to_user+0x2c/0x150 [ 2713.096405][ T6028] simple_read_from_buffer+0xcc/0x160 [ 2713.101807][ T6028] proc_fail_nth_read+0x187/0x220 [ 2713.107031][ T6028] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2713.112780][ T6028] ? security_file_permission+0xab/0xd0 [ 2713.118356][ T6028] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2713.124111][ T6028] vfs_read+0x1b5/0x600 [ 2713.128294][ T6028] ksys_read+0x12d/0x250 [ 2713.132556][ T6028] ? vfs_write+0xae0/0xae0 [ 2713.136997][ T6028] ? syscall_enter_from_user_mode+0x21/0x70 [ 2713.142923][ T6028] do_syscall_64+0x35/0xb0 [ 2713.147365][ T6028] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2713.153278][ T6028] RIP: 0033:0x7f84744a35ec [ 2713.157706][ T6028] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2713.177430][ T6028] RSP: 002b:00007f8471a66170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2713.185865][ T6028] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f84744a35ec 08:34:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1a21a1, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:34:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 08:34:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2, 0x0, 0x0, 0x0, 0x5}}) 08:34:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffff1f, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2713.193852][ T6028] RDX: 000000000000000f RSI: 00007f8471a661e0 RDI: 0000000000000003 [ 2713.201842][ T6028] RBP: 00007f8471a661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2713.209828][ T6028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2713.217816][ T6028] R13: 00007ffc78bae98f R14: 00007f8471a66300 R15: 0000000000022000 [ 2713.225823][ T6028] 08:34:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 08:34:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:34:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) (fail_nth: 1) [ 2713.585416][ T6053] FAULT_INJECTION: forcing a failure. [ 2713.585416][ T6053] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.598351][ T6053] CPU: 1 PID: 6053 Comm: syz-executor.1 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2713.608268][ T6053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2713.618344][ T6053] Call Trace: [ 2713.621637][ T6053] [ 2713.624578][ T6053] dump_stack_lvl+0xcd/0x134 [ 2713.629194][ T6053] should_fail.cold+0x5/0xa [ 2713.633720][ T6053] ? tomoyo_realpath_from_path+0xc3/0x620 [ 2713.639469][ T6053] should_failslab+0x5/0x10 [ 2713.643997][ T6053] __kmalloc+0x72/0x340 [ 2713.648179][ T6053] tomoyo_realpath_from_path+0xc3/0x620 [ 2713.653756][ T6053] ? tomoyo_profile+0x42/0x50 [ 2713.658462][ T6053] tomoyo_path_number_perm+0x1d5/0x590 [ 2713.663955][ T6053] ? tomoyo_path_number_perm+0x18d/0x590 [ 2713.669622][ T6053] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2713.675489][ T6053] ? lock_downgrade+0x6e0/0x6e0 [ 2713.680377][ T6053] ? __fget_files+0x23d/0x3e0 08:34:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x7, &(0x7f0000000240)={0x0, 0x0}) [ 2713.685081][ T6053] security_file_ioctl+0x50/0xb0 [ 2713.690060][ T6053] __x64_sys_ioctl+0xb3/0x200 [ 2713.694763][ T6053] do_syscall_64+0x35/0xb0 [ 2713.699191][ T6053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2713.705085][ T6053] RIP: 0033:0x7fe908ebba39 [ 2713.709502][ T6053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2713.729116][ T6053] RSP: 002b:00007fe906431188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2713.737536][ T6053] RAX: ffffffffffffffda RBX: 00007fe908fbef60 RCX: 00007fe908ebba39 [ 2713.745505][ T6053] RDX: 0000000020000180 RSI: 00000000000089f2 RDI: 0000000000000003 [ 2713.753480][ T6053] RBP: 00007fe9064311d0 R08: 0000000000000000 R09: 0000000000000000 [ 2713.761531][ T6053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2713.769496][ T6053] R13: 00007ffcc4e871af R14: 00007fe906431300 R15: 0000000000022000 [ 2713.777495][ T6053] 08:34:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) (fail_nth: 1) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 1) 08:34:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2713.781953][ T6053] ERROR: Out of memory at tomoyo_realpath_from_path. 08:34:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2713.879476][ T6059] FAULT_INJECTION: forcing a failure. [ 2713.879476][ T6059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2713.892903][ T6059] CPU: 1 PID: 6059 Comm: syz-executor.4 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2713.902826][ T6059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2713.912891][ T6059] Call Trace: [ 2713.916181][ T6059] [ 2713.919123][ T6059] dump_stack_lvl+0xcd/0x134 [ 2713.922059][ T6061] FAULT_INJECTION: forcing a failure. [ 2713.922059][ T6061] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.923738][ T6059] should_fail.cold+0x5/0xa [ 2713.923778][ T6059] _copy_from_user+0x2c/0x180 [ 2713.923815][ T6059] do_seccomp+0xad0/0x2890 [ 2713.923848][ T6059] ? __context_tracking_exit+0xb8/0xe0 [ 2713.923874][ T6059] ? lock_downgrade+0x6e0/0x6e0 [ 2713.960365][ T6059] ? __seccomp_filter+0x1040/0x1040 [ 2713.965587][ T6059] ? syscall_enter_from_user_mode+0x21/0x70 [ 2713.971494][ T6059] do_syscall_64+0x35/0xb0 [ 2713.975915][ T6059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2713.981813][ T6059] RIP: 0033:0x7f6f9004ea39 [ 2713.986226][ T6059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2714.005832][ T6059] RSP: 002b:00007f6f8d5c4188 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2714.014246][ T6059] RAX: ffffffffffffffda RBX: 00007f6f90151f60 RCX: 00007f6f9004ea39 [ 2714.022224][ T6059] RDX: 0000000020000240 RSI: 0000000000000000 RDI: 0000000000000002 [ 2714.030203][ T6059] RBP: 00007f6f8d5c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2714.038181][ T6059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2714.046154][ T6059] R13: 00007ffd7ecdfe5f R14: 00007f6f8d5c4300 R15: 0000000000022000 [ 2714.054139][ T6059] [ 2714.057157][ T6061] CPU: 0 PID: 6061 Comm: syz-executor.3 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2714.067063][ T6061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2714.077134][ T6061] Call Trace: [ 2714.080445][ T6061] [ 2714.083472][ T6061] dump_stack_lvl+0xcd/0x134 [ 2714.088091][ T6061] should_fail.cold+0x5/0xa [ 2714.092620][ T6061] ? tomoyo_realpath_from_path+0xc3/0x620 [ 2714.098394][ T6061] should_failslab+0x5/0x10 [ 2714.102913][ T6061] __kmalloc+0x72/0x340 [ 2714.107100][ T6061] tomoyo_realpath_from_path+0xc3/0x620 [ 2714.112764][ T6061] ? tomoyo_profile+0x42/0x50 [ 2714.117649][ T6061] tomoyo_path_number_perm+0x1d5/0x590 [ 2714.123119][ T6061] ? tomoyo_path_number_perm+0x18d/0x590 [ 2714.128774][ T6061] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2714.134618][ T6061] ? lock_downgrade+0x6e0/0x6e0 [ 2714.139524][ T6061] ? __fget_files+0x23d/0x3e0 [ 2714.144209][ T6061] security_file_ioctl+0x50/0xb0 [ 2714.149152][ T6061] __x64_sys_ioctl+0xb3/0x200 [ 2714.153834][ T6061] do_syscall_64+0x35/0xb0 [ 2714.158253][ T6061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2714.164149][ T6061] RIP: 0033:0x7faf1fb68a39 [ 2714.168563][ T6061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2714.188265][ T6061] RSP: 002b:00007faf1d0de188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2714.196685][ T6061] RAX: ffffffffffffffda RBX: 00007faf1fc6bf60 RCX: 00007faf1fb68a39 [ 2714.204655][ T6061] RDX: 000000000000000c RSI: 0000000000004c80 RDI: 0000000000000003 [ 2714.212621][ T6061] RBP: 00007faf1d0de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2714.220585][ T6061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2714.228551][ T6061] R13: 00007ffd279599df R14: 00007faf1d0de300 R15: 0000000000022000 [ 2714.236536][ T6061] [ 2714.239686][ T6061] ERROR: Out of memory at tomoyo_realpath_from_path. 08:34:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7, &(0x7f0000000240)={0x0, 0x0}) 08:34:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x700, &(0x7f0000000240)={0x0, 0x0}) [ 2714.376557][ T26] audit: type=1326 audit(1635064478.423:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6063 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x7000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x300, &(0x7f0000000240)={0x0, 0x0}) 08:34:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) (fail_nth: 2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) (fail_nth: 2) 08:34:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2714.609854][ T6080] FAULT_INJECTION: forcing a failure. [ 2714.609854][ T6080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2714.623153][ T6080] CPU: 0 PID: 6080 Comm: syz-executor.4 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2714.633078][ T6080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2714.643147][ T6080] Call Trace: [ 2714.646455][ T6080] [ 2714.649410][ T6080] dump_stack_lvl+0xcd/0x134 [ 2714.654033][ T6080] should_fail.cold+0x5/0xa [ 2714.658565][ T6080] _copy_to_user+0x2c/0x150 [ 2714.663100][ T6080] simple_read_from_buffer+0xcc/0x160 [ 2714.668501][ T6080] proc_fail_nth_read+0x187/0x220 [ 2714.673553][ T6080] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2714.679307][ T6080] ? security_file_permission+0xab/0xd0 [ 2714.684908][ T6080] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2714.690676][ T6080] vfs_read+0x1b5/0x600 [ 2714.694860][ T6080] ksys_read+0x12d/0x250 [ 2714.699213][ T6080] ? vfs_write+0xae0/0xae0 [ 2714.703651][ T6080] ? syscall_enter_from_user_mode+0x21/0x70 08:34:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x500, &(0x7f0000000240)={0x0, 0x0}) [ 2714.709579][ T6080] do_syscall_64+0x35/0xb0 [ 2714.714019][ T6080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2714.719935][ T6080] RIP: 0033:0x7f6f900015ec [ 2714.724363][ T6080] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2714.724647][ T6077] FAULT_INJECTION: forcing a failure. [ 2714.724647][ T6077] name failslab, interval 1, probability 0, space 0, times 0 [ 2714.743996][ T6080] RSP: 002b:00007f6f8d5c4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2714.744031][ T6080] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6f900015ec [ 2714.744048][ T6080] RDX: 000000000000000f RSI: 00007f6f8d5c41e0 RDI: 0000000000000003 [ 2714.744064][ T6080] RBP: 00007f6f8d5c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2714.744081][ T6080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2714.744098][ T6080] R13: 00007ffd7ecdfe5f R14: 00007f6f8d5c4300 R15: 0000000000022000 [ 2714.744132][ T6080] [ 2714.809394][ T6077] CPU: 1 PID: 6077 Comm: syz-executor.3 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2714.819302][ T6077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2714.829373][ T6077] Call Trace: [ 2714.832657][ T6077] [ 2714.835584][ T6077] dump_stack_lvl+0xcd/0x134 [ 2714.840184][ T6077] should_fail.cold+0x5/0xa [ 2714.844691][ T6077] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 2714.850069][ T6077] should_failslab+0x5/0x10 [ 2714.854581][ T6077] __kmalloc+0x72/0x340 [ 2714.858744][ T6077] tomoyo_encode2.part.0+0xe9/0x3a0 [ 2714.863973][ T6077] tomoyo_encode+0x28/0x50 [ 2714.868393][ T6077] tomoyo_realpath_from_path+0x186/0x620 [ 2714.874043][ T6077] tomoyo_path_number_perm+0x1d5/0x590 [ 2714.879503][ T6077] ? tomoyo_path_number_perm+0x18d/0x590 [ 2714.885159][ T6077] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2714.891001][ T6077] ? lock_downgrade+0x6e0/0x6e0 [ 2714.895872][ T6077] ? __fget_files+0x23d/0x3e0 [ 2714.900568][ T6077] security_file_ioctl+0x50/0xb0 [ 2714.905510][ T6077] __x64_sys_ioctl+0xb3/0x200 [ 2714.910202][ T6077] do_syscall_64+0x35/0xb0 [ 2714.914621][ T6077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2714.920513][ T6077] RIP: 0033:0x7faf1fb68a39 [ 2714.924927][ T6077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2714.944535][ T6077] RSP: 002b:00007faf1d0de188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2714.952945][ T6077] RAX: ffffffffffffffda RBX: 00007faf1fc6bf60 RCX: 00007faf1fb68a39 [ 2714.960909][ T6077] RDX: 000000000000000c RSI: 0000000000004c80 RDI: 0000000000000003 [ 2714.968874][ T6077] RBP: 00007faf1d0de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2714.976856][ T6077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2714.984835][ T6077] R13: 00007ffd279599df R14: 00007faf1d0de300 R15: 0000000000022000 [ 2714.992918][ T6077] [ 2714.996071][ T6077] ERROR: Out of memory at tomoyo_realpath_from_path. 08:34:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x700, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x700000000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x10, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc07f, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2715.190682][ T26] audit: type=1326 audit(1635064479.233:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6079 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 [ 2715.213330][ T26] audit: type=1326 audit(1635064479.233:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6079 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7fe0f6d4c67b code=0x0 08:34:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) (fail_nth: 3) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xf07f, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x4c01, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 2715.405549][ T26] audit: type=1326 audit(1635064479.423:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6097 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x7, 0x0}) [ 2715.551015][ T6108] FAULT_INJECTION: forcing a failure. [ 2715.551015][ T6108] name failslab, interval 1, probability 0, space 0, times 0 [ 2715.563912][ T6108] CPU: 0 PID: 6108 Comm: syz-executor.3 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2715.573831][ T6108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2715.583908][ T6108] Call Trace: [ 2715.587197][ T6108] [ 2715.590134][ T6108] dump_stack_lvl+0xcd/0x134 [ 2715.594755][ T6108] should_fail.cold+0x5/0xa [ 2715.599279][ T6108] ? loop_add+0x4b/0x9b0 [ 2715.603576][ T6108] should_failslab+0x5/0x10 [ 2715.608095][ T6108] kmem_cache_alloc_trace+0x55/0x2c0 [ 2715.613405][ T6108] ? lock_downgrade+0x6e0/0x6e0 [ 2715.618282][ T6108] loop_add+0x4b/0x9b0 [ 2715.622376][ T6108] loop_control_ioctl+0x130/0x4a0 [ 2715.627421][ T6108] ? loop_probe+0x80/0x80 [ 2715.631771][ T6108] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2715.638125][ T6108] ? loop_probe+0x80/0x80 [ 2715.642471][ T6108] __x64_sys_ioctl+0x193/0x200 [ 2715.647265][ T6108] do_syscall_64+0x35/0xb0 [ 2715.651717][ T6108] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2715.657637][ T6108] RIP: 0033:0x7faf1fb68a39 [ 2715.662068][ T6108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2715.681693][ T6108] RSP: 002b:00007faf1d0de188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2715.690126][ T6108] RAX: ffffffffffffffda RBX: 00007faf1fc6bf60 RCX: 00007faf1fb68a39 08:34:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x300, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2715.698116][ T6108] RDX: 000000000000000c RSI: 0000000000004c80 RDI: 0000000000000003 [ 2715.706097][ T6108] RBP: 00007faf1d0de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2715.714080][ T6108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2715.722089][ T6108] R13: 00007ffd279599df R14: 00007faf1d0de300 R15: 0000000000022000 [ 2715.730093][ T6108] 08:34:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) (fail_nth: 4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x500, &(0x7f0000000240)={0x0, 0x0}) 08:34:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xfc7f, &(0x7f0000000240)={0x0, 0x0}) [ 2715.890698][ T26] audit: type=1326 audit(1635064479.933:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6121 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x700, 0x0}) 08:34:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2716.003153][ T26] audit: type=1326 audit(1635064479.983:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6121 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7fe0f6d4c67b code=0x0 [ 2716.033198][ T6128] FAULT_INJECTION: forcing a failure. [ 2716.033198][ T6128] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2716.046583][ T6128] CPU: 1 PID: 6128 Comm: syz-executor.3 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2716.056492][ T6128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2716.066558][ T6128] Call Trace: [ 2716.069843][ T6128] [ 2716.072775][ T6128] dump_stack_lvl+0xcd/0x134 [ 2716.077384][ T6128] should_fail.cold+0x5/0xa [ 2716.081897][ T6128] _copy_to_user+0x2c/0x150 [ 2716.086406][ T6128] simple_read_from_buffer+0xcc/0x160 [ 2716.091790][ T6128] proc_fail_nth_read+0x187/0x220 [ 2716.096821][ T6128] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2716.102549][ T6128] ? security_file_permission+0xab/0xd0 [ 2716.108105][ T6128] ? proc_tid_comm_permission+0x1b0/0x1b0 [ 2716.113828][ T6128] vfs_read+0x1b5/0x600 [ 2716.117989][ T6128] ksys_read+0x12d/0x250 [ 2716.122232][ T6128] ? vfs_write+0xae0/0xae0 [ 2716.126655][ T6128] ? syscall_enter_from_user_mode+0x21/0x70 [ 2716.132560][ T6128] do_syscall_64+0x35/0xb0 [ 2716.136977][ T6128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2716.142871][ T6128] RIP: 0033:0x7faf1fb1b5ec [ 2716.147301][ T6128] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2716.166908][ T6128] RSP: 002b:00007faf1d0de170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2716.175318][ T6128] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007faf1fb1b5ec [ 2716.183284][ T6128] RDX: 000000000000000f RSI: 00007faf1d0de1e0 RDI: 0000000000000006 [ 2716.191250][ T6128] RBP: 00007faf1d0de1d0 R08: 0000000000000000 R09: 0000000000000000 08:34:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5450, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xff7f, &(0x7f0000000240)={0x0, 0x0}) [ 2716.199214][ T6128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2716.207292][ T6128] R13: 00007ffd279599df R14: 00007faf1d0de300 R15: 0000000000022000 [ 2716.215277][ T6128] 08:34:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x700, &(0x7f0000000240)={0x0, 0x0}) 08:34:40 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @frame_sync}) [ 2716.347916][ T26] audit: type=1326 audit(1635064480.393:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6133 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5451, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc07f, &(0x7f0000000240)={0x0, 0x0}) 08:34:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x30000, &(0x7f0000000240)={0x0, 0x0}) 08:34:40 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000080)=0xb3, 0x4) accept$netrom(r2, 0x0, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x2, r1, 0x5f2, 0x80000}) 08:34:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xf07f, &(0x7f0000000240)={0x0, 0x0}) [ 2716.578929][ T26] audit: type=1326 audit(1635064480.623:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6148 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x50000, &(0x7f0000000240)={0x0, 0x0}) [ 2716.682225][ T26] audit: type=1326 audit(1635064480.663:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6148 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7fe0f6d4c67b code=0x0 08:34:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xfc7f, &(0x7f0000000240)={0x0, 0x0}) 08:34:40 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5460, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x2, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7000000, &(0x7f0000000240)={0x0, 0x0}) [ 2716.874348][ T26] audit: type=1326 audit(1635064480.923:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6162 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe0f6d99a39 code=0x0 08:34:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xff7f, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x6364, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x10, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x140) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000080)={{0x0, 0x40}, 0x0, 0x5, 0xffffff7d, {0x3f, 0x5}, 0x9, 0xf5}) 08:34:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7fc00000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x30000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c01, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7ff00000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet6_tcp(0xa, 0x1, 0x0) 08:34:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x50000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8911, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xe, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7ffc0000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 0: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)=0x2) ioctl$SOUND_MIXER_READ_DEVMASK(0xffffffffffffffff, 0x80044dfe, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x97, 0x6, 0x0, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x20, 0x10, 0x924c, 0x2}}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=@ipv6_newaddr={0x50, 0x14, 0x4, 0x70bd25, 0x25dfdbfb, {0xa, 0x0, 0x0, 0xfe, r2}, [@IFA_FLAGS={0x8, 0x8, 0x2}, @IFA_FLAGS={0x8, 0x8, 0x682}, @IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_LOCAL={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x5, 0x7f, 0x8000, 0x100, r0, 0x9, '\x00', 0x0, r3, 0x5, 0x1, 0x5}, 0x40) socket$l2tp(0x2, 0x2, 0x73) 08:34:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7fff0000, &(0x7f0000000240)={0x0, 0x0}) 08:34:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7fc00000, &(0x7f0000000240)={0x0, 0x0}) [ 2717.743346][ T6224] device ip6tnl0 entered promiscuous mode 08:34:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x891d, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:41 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x51b081, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x100000001}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'sit0\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7ff00000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x891e, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(r0, &(0x7f0000000000)=@caif, &(0x7f0000000080)=0x80) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7ffc0000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x541b, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x30000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0xa, &(0x7f0000000080)={0x0, 0x0}) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000100)={r1, 0x1, 0xfffd000, 0x1000000}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000180)=ANY=[@ANYBLOB="8f978e221a70918c28", @ANYRES32=r2, @ANYBLOB="0000000000f0ffff00000000000000f0ffffffff"]) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000140)={r4, 0x0, 0x1000000000000, 0xfffff000}) 08:34:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x7fff0000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x50000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x5421, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x444040, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={0x0, 0x5, 0x4}) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8921, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc07f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x5450, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x30000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x7, 0x5a, 0xff, 0x8001}, {0x9, 0xff, 0x5c, 0x2}, {0x20, 0x6, 0x7, 0x1}, {0xfe01, 0x40, 0x5, 0x6}, {0x71c3, 0x8, 0x4, 0x1dde}, {0x8, 0x1, 0x3f, 0x401}, {0x1dd, 0x4, 0x2, 0x7fffffff}, {0x1, 0x1f, 0x7, 0x6}, {0x8, 0x0, 0x20, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f00000000c0)) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xf07f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x50000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x5451, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xfc7f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:42 executing program 0: socket(0x18, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 2718.939832][ T6323] ip6tnl0: mtu greater than device maximum 08:34:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc07f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xff7f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xf07f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0xa, &(0x7f0000000000)={0x0, 0x0}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x0, 0x7, 0x6, 0x5}, {0x4, 0x6, 0xbf, 0x10000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0xa2040, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000001c0)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 08:34:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x5452, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x21, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x700000000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xfc7f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x5460, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8927, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x1, 0x7, 0x3f, 0x80}, {0x5, 0x13, 0x3, 0xb4}, {0x67e, 0x9, 0x1, 0x9}, {0x5, 0x0, 0x3, 0x101}, {0x40, 0x1, 0xc8, 0x3f}, {0x8001, 0x7, 0xfc, 0x8}, {0xfffc, 0x7, 0x3, 0x9}, {0x7, 0x8, 0x8a, 0x9}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x284280, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x4, 0x1, 0x3f, 0x6, 0x27, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, 0x7800, 0x7, 0x4b7, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x0, 0x1, [{r1, 0x0, 0x0, 0x1000000000000}]}) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x24, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8929, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xff7f00000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x6364, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x25, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8930, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x7, 0x0}) 08:34:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x700000000000000, &(0x7f0000000240)={0x0, 0x0}) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x28, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x223480, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0xe, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xffff}, [@exit, @jmp={0x5, 0x0, 0x5, 0x3, 0x8, 0xfffffffffffffff4, 0x1}, @generic={0x5, 0xe, 0x4, 0x2, 0x526}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x9e}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @ldst={0x2, 0x2, 0x3, 0x3, 0xb, 0xfffffffffffffff0, 0x8}, @alu={0x4, 0x1, 0x3, 0x5, 0x1, 0x4, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0xc, 0x5, 0x400}, 0x10, 0xdd56}, 0x78) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000200)={0x0, 0x3, r1, 0xfffffff7, 0x80000}) 08:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x700, 0x0}) 08:34:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x8913, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) getpgid(r1) syz_genetlink_get_family_id$smc(&(0x7f0000000000), r0) 08:34:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x7, 0x0}) 08:34:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x8914, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:44 executing program 0: r0 = socket(0x21, 0x3, 0x31) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r1, 0x4, 0x7, 0xfb, 0x3, 0xa, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x20, 0x10, 0x9, 0x2}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2d, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = socket(0xcdd8201ddd1dbc00, 0x80000, 0xfffffffa) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000780)={'ip6tnl0\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x29, 0x20, 0xc1, 0x8, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x8, 0x7800, 0xfffffffa, 0x59}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000840)={'syztnl1\x00', &(0x7f00000007c0)={'syztnl0\x00', r3, 0x4, 0x1f, 0x4, 0x20000, 0x23, @loopback, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x0, 0x20, 0x10000, 0x7ff}}) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r1, 0x80044dfc, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:34:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x700, 0x0}) 08:34:44 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) 08:34:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x8933, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x30, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000240)={0x0, 0x0}) 08:34:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1, 0xff, 0x8, 0xfffffff9}, {0x2, 0x3, 0xfe, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000080)) 08:34:44 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x20, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x0, 0x2, 'caif0\x00'}]}, 0xfffffffffffffe2d}, 0x1, 0x0, 0x0, 0x10080}, 0x4000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x3, 0x0, 0x80, 0x20}, {0x8f, 0x2, 0x9, 0xfffffffe}, {0x4, 0x4, 0x5, 0x9}, {0xf1fc, 0xa1, 0x3f, 0x80000001}, {0x7, 0x99, 0x3f, 0x80}, {0x1f, 0x0, 0x8, 0x4}, {0x6, 0xff, 0x7, 0x5}, {0x3, 0x9, 0x20}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0x1, &(0x7f0000000280)="d926e1d7b8d2f902643336a8e0bcd6983d7310d2dcc1eb38b4e46bb7eebfb660cf5e85f660a0cfd0fd79d4139849280ea9966d15edf11b8fe923741264ebaa0286db620deb8b672bbb2e9d0000000000000200"/102, &(0x7f00000001c0)=@tcp=r0, 0x1}, 0x20) 08:34:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000000)={0x0, 0x0}) 08:34:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x34, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x400448c9, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8942, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x8, &(0x7f0000000240)={0x0, 0x0}) 08:34:44 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', r1, 0x29, 0x81, 0x8, 0xd5, 0x34, @remote, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7800, 0x1, 0x4, 0x3ff}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x1a3000, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f00000002c0)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = socket$pptp(0x18, 0x1, 0x2) io_cancel(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x401, r2, &(0x7f00000003c0)="bc5156e10c4b40a720272af4ad797d1b73b5ac5f8d8881de1b2527d49f4f3ebe432065e591185824fa452ac2b9462c2ff47d1e4b9f3dcd96c12f9b3611e70affcdd18a73ee2cd0c55c62234994e3541d6984e25687cb5a1f8dc376e9dd96d87aa511e8a5249684dbdc588976c63833e147e23a6b9901c105a9d99e08a12d72c43f378711daedda8fe4f84ab989c238c86b0a102f9e4cba00198041a14d29956ea3745d4694d710ab08a5f34382778de65ff6385555b7017f6391cdf20d7555d2f4c422a9fda448c08e2fe73d764dbd8540ec06b288d396a9574ab5308158fc5391aff7", 0xe3, 0x0, 0x0, 0x3, r0}, &(0x7f0000000200)) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000680), 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = eventfd(0x3e) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(0x0, 0x7, &(0x7f0000000a40)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x9, 0xffffffffffffffff, &(0x7f00000004c0)="b4f3c4", 0x3, 0xe95000, 0x0, 0x3, r0}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0xedee, 0xffffffffffffffff, &(0x7f0000000580)="f56c2de001350b9d7d1caffa47200a0a0bd25ba0095689c321af", 0x1a, 0x6, 0x0, 0x2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x7, 0xef85, 0xffffffffffffffff, &(0x7f0000000600)="67b205d9b5725b3cb2d22330fa397d1e9ae739624c6714aead", 0x19, 0x3, 0x0, 0x3, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x100, r3, &(0x7f0000000700)="c3a6671a4d61ed548426e2990c3703d77c8d74e739c74cd5d6d1fa5362eb180be7dcddc0fc8624fc372bb18ec2273883b4a189d9a830e36b722c4ca4d4580f99f0e3ba5af6d23db03ab7c62f17634f32cd09e14955c0ea7b07a337bdcc8c13db37086f59ce6d549800c64d83766630d3a949e984", 0x74, 0x7, 0x0, 0x3, r4}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f00000007c0)="c117e68a8693979ec57ecc35f4be9d7a013d8db141d9da3cbeb4dd3d9f97587a009e5dd61402b633bad4fc26f92a2c0ec479b30adbd59076f6d71d9fc0d142b504", 0x41, 0x9a2c, 0x0, 0x1, r5}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x8, 0xb313, r0, &(0x7f0000000880)="f7cbf0059bef6b034802db05e6ccfe6eb1292425777aaf526223e2d0543f593c82cf928ef23340a33c10efeed35df92bb9921a9cca3d4c865cc966ab29f9b628c1054dced417330922e255c2fe9539dbd5d463a53a197ee54a4804391ed136ddd3d33cd0db95832fb23d609f9c3a6d758ccfa656086f842d537b5e44e9f6589d95d5394a49e939fdb7c8c685d7fd4b5a3c80917a7c313e2bf6ea70d4d26ea908223811ff94eb26a040802d55ef6bc2e2320ffa80f01b1061441ade4acd3da4c053ec8ea74fe31e18a381b87d71cb422db3c9f07097d972852d1fc56dd1ec2541cddaccb18b29c43c13f84e3ce75d84e956ec7a9daaea7b56cc", 0xf9, 0x4, 0x0, 0x2, r0}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x5, r6, &(0x7f00000009c0), 0x0, 0x6223, 0x0, 0x2, r0}]) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) io_uring_setup(0x200041cd, &(0x7f0000000340)={0x0, 0x1252, 0x1, 0x1, 0x317, 0x0, r0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, 0x0) sendmsg$SMC_PNETID_GET(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="08000600", @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf25010000190900010073797a3000000000"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x840) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000300)) 08:34:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x400448dd, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x35, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000000)={0xffffffffffffff0e, 0x0}) 08:34:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710}, 0x10, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000180)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffffffffffff}]}, 0x20}, 0x1, 0x0, 0x0, 0x40040}, 0x8000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000040)=0x4, 0x8) 08:34:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x400454ca, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:45 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000080)=r2) 08:34:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:45 executing program 5: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:45 executing program 0: r0 = eventfd(0x2) r1 = eventfd(0x4c) r2 = eventfd(0x3) io_submit(0x0, 0x7, &(0x7f0000000500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0xffff, 0xffffffffffffffff, &(0x7f0000000000)="998a44dd9a7ed6951023eeb8a3d442ac5e562b362642a74d34ece27c2934549c04b017636d58fa5be5f4da21bc804fb7a939190620dfe0b1ec3dcd83ce7a10deca90d9402fa9f99dd8a11bf0d70080b63a6a25acede21397d8c4d4a717e9bb4fee7e244f13d4b277cf5cbf49a653b7592d84436523eb46", 0x77, 0x3, 0x0, 0x2, r0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x401, 0xffffffffffffffff, &(0x7f00000000c0)="bda8f7f5a081b8c25aedc6074c0fb2fbb75a385cc8", 0x15, 0x7ec, 0x0, 0x1}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x80, 0xffffffffffffffff, &(0x7f0000000140)="fa03546d75274d26697ea8fc76d78f56cb0a3f773cb69a347b6b3d4aca7ba2aa9523a3cf9e2851e65b657a63996a1f9a2f3ce420d2d6d17938931f38cc01bc85459db6f8f2b07853063558c5f408384ed9e85adc73cd6814a7a7e54f8b92b0583942929b8872de5c9803f9e7d54a586122c95f86ef060fa617bf3be707", 0x7d, 0x80000001, 0x0, 0x1, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x6, 0xffffffffffffffff, &(0x7f0000000200)="c2ce22714f3c77eb795e4fa96728de7fab40a718f56cf4eba00902ca8eb96930a954044493f49f9627062513e509e28c37b17e88da36dced21ec0db71bfd573678e9ea4c5be6302a8f3e75ec05182372c28c9dd06816fe248cc7bbd1fbbb0aa6e118b6edb218ae2680f8c126d9fbd1e5bc7b21d43abb77816368eac6cee6040fda63c3574c568386ad45ed4a45ba0f984eac808ee69b29b854c07eb2dbb6", 0x9e, 0x7, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000300)="6f88629d7da8315b9cd665dd6c17a0245b6f9adf5b545bf9f58f75364e326d44b9ba631fdebdfd7bf96bd52ff3ff1d22eae4e2a09be1ac2628be3ecf03da24271308827b5a3d2f9c0e521a49da4f8d954e27aae7de19ead1ec95fa0804cdaf75b119b4490858afcda31818456b6ef2e750cc669d620f117a16a274214e72b59402b82bc895ddee4a336e955e3b193c21e63defbebc2c973743ed95d35eaea2b51dd08e", 0xa3, 0x1, 0x0, 0x2, r1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x4, 0xffffffffffffffff, &(0x7f0000000400)="0519360e37da429a6d4ebead0064bcf3f4", 0x11, 0x8, 0x0, 0x1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f0000000480)="d2aa3c2975278191761012f0", 0xc, 0x100000000, 0x0, 0x6, r2}]) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000640)="add953047b96f989650a3fa47c5b6c966cedad4ad8b0326eb4371a49a1b09d106f31afd905f46308a802ef9c6d349e6758ab11bb83ab0c49b4778ccb4d66ce3e676d3f4f395a89bfffb8a480ab89f8d45c544ba7636de73606bd99a390c7bfc06bdf2dd0478d2d520cf61fe7340f5d4faef722279e819d794eeb7650c20b17434d465b980aa997fff46d6e2910a732a8e55d84caab8f7e8e9dde285335cbdaf28f265efdb0e3f912da78fcb6c91d909a176fc780a352c770e348cebb09fc6dcb6663bcdf7a0301dbb873330af7033e7792b3050d4f76274aa74473947665fe8df1bd4299e05964015458db13", 0xec) 08:34:45 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x1000, 0x7, 0x40, 0x800}, {0x2, 0x7, 0x4, 0x6}, {0x81, 0x5, 0x6, 0x2}, {0x11cc, 0x1, 0x42, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000180)={r2, 0x100000000, 0x1f}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) 08:34:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x40049409, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:45 executing program 4: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0xa7, 0x4, 0x2, @loopback, @empty, 0x7, 0x1, 0x57b, 0x7}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000240)={0x0, 0x0}) 08:34:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8948, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0x2, 0x3}, 'port0\x00', 0x3569d15c6f06136c, 0x10002, 0x8000, 0x1f, 0x3, 0x9, 0xe0, 0x0, 0x0, 0x1}) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x44, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) 08:34:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x40086602, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x24580, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x9c, r1, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x4804) 08:34:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) getpeername$packet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:45 executing program 0: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x81}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x200040c0}, 0x40) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = memfd_create(&(0x7f0000000040)='lo\x00', 0x7) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000280)={r3, 0x0, 0x8000, 0xfffffffff0000000}) 08:34:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x45, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:45 executing program 5: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)="bb041a2d282178b5a22a6836c4e3e8d3b1f7b2bfe3ca3e4cb8db95d77b90712ef8aeeb5ca68fd196f315949f7f946922df287ef3fd607b56f47cbab09e1a871e46c3e8a5a1c1ba6fdf8fa7f45f590f99eeb565a26f63484350af5e64dcde02c7d482e9e7c04ad8aac5ba3e0ff16a6249bfd8e3834a285c526c7b3dd51747e22ac377e9c002fbf63e3024850ff590b679782edfa1d2d8725ba8e3278ac71780478c0ee25478bc2c55721910fcccecf425c8beaa1d52effe05284ae425249d693a3d4a3e02a0add442875bda37bfc5148df87cb2cf07aef4ea4f90aa7e9a8e546895f9628d9fd59801", 0xe8) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) accept4$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @local}, 0x10, 0x80400) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x301000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000140)={0x0, 0xb77, 0x4}) 08:34:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x40186366, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x80580, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x744}]}, 0x2c}}, 0x40000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x894a, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x8, &(0x7f0000000040)={0x0, 0x0}) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x48, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000040)={0x0, 0x0}) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8970, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x401c5820, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:46 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={0x0, 0x1, r0, 0x4}) 08:34:46 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x209}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=@newlinkprop={0x14c, 0x6c, 0x10, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x400, 0x82280}, [@IFLA_MAP={0x24, 0xe, {0x100, 0x71f8, 0x7, 0x5, 0x9, 0xde}}, @IFLA_VFINFO_LIST={0xf4, 0x16, 0x0, 0x1, [{0xf0, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc, 0x5, {0x0, 0x3}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x2, 0xa23}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x0, 0x5}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x400000, 0x8}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x30, 0x80000001}}, @IFLA_VF_TRUST={0xc, 0x9, {0x8, 0xfffffc00}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x2, 0x600}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @random="3e5818235fdf"}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0x58, 0x1}}, {0x14, 0x1, {0xffff8001, 0x58c, 0x4, 0x88a8}}, {0x14, 0x1, {0x3, 0x31c, 0x6, 0x88a8}}, {0x14, 0x1, {0xfffffffc, 0x238, 0x3f, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x10000, 0x400}}]}]}, @IFLA_LINK={0x8}, @IFLA_BROADCAST={0xa, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x6, &(0x7f0000000240)={0x0, 0x0}) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:46 executing program 5: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10, 0x180000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x4, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8971, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000040)={0x5e, 0x0}) 08:34:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000040)={0xfffffffffffffe40, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x9, 0x9, 0x6}, {0x7ff, 0x0, 0x69, 0xc42}, {0x1, 0x81, 0x58, 0x7}]}) 08:34:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4020940d, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4d, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000040)={0xd, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x29, 0x8, 0x1, 0x0, 0x65, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0xa}, 0x7000, 0x700, 0xedf, 0xff}}) 08:34:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000040)={0x0, 0x0}) sendto$netrom(0xffffffffffffffff, &(0x7f0000000000)="55ad33adc06e711174042fd187198e7482c1be6196c2360f20878906be8f4e5b40ae78f90419", 0x26, 0x4000000, 0x0, 0x0) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x50, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x45, 0x0}) 08:34:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000040)={0x0, 0x0}) 08:34:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x80086301, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x18000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x8040, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000040)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES32=r2, @ANYRES64], 0x170}, 0x1, 0x0, 0x0, 0x24008400}, 0x80) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8992, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x54, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:46 executing program 0: io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000), 0x1) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) 08:34:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, &(0x7f0000000040)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'sit0\x00', r1, 0x2, 0x7f, 0x8, 0x800, 0x4, @loopback, @mcast2, 0x80, 0x10, 0x4, 0x7}}) 08:34:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8993, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000040)={0x0, 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000000)) 08:34:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x80086601, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:47 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000180)=r2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x90481, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r3, 0x80044dfc, &(0x7f0000000080)) ioctl$SOUND_MIXER_READ_RECSRC(r3, 0x80044dff, &(0x7f00000000c0)) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "3e7e11993a8c8ac1", "0c8a836ac28a61a3002c373bc4d89cfe", "aea8a198", "2d1a013093750a23"}, 0x28) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x779000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000080)={0x2ef5, 0x1, 'client1\x00', 0xffffffff00000002, "8c069bcebea1960c", "b47e720bf005eacff0803d5a0298be59e6cf928077be382d2596885882e72ddd", 0x400, 0x2}) 08:34:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100)=@gcm_256={{0x304}, "ff7248f7a1f487a9", "41db3a5eba5c5bb731a2d513f83a3497f5df1e8fbb41b55e4f37899e21f5cf0e", "627019d8", "901be33a4607cb7d"}, 0x38) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x0, 0x3ff, 0x20, @private2, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7800, 0x7800, 0x1ff, 0x1ff}}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00'}) 08:34:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x801c581f, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x60, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:47 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) 08:34:47 executing program 4: ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)={{0x40, 0x8}, 0x1, 0x6d0, 0x2, {0x3, 0x40}, 0x30, 0x1ff}) connect$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x3, @multicast1}}, 0x1e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8995, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3c}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x80) 08:34:47 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000440), 0x0, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x5, &(0x7f00000001c0)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x2, 0x1, 0x9, 0x8, 0x18, 0xf}, @ldst={0x0, 0x2, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x0, 0xb, 0x9, 0x0, 0xffffffffffffff94, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0x23, &(0x7f0000000280)=""/35, 0x41000, 0x4, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x10, 0x100, 0x100}, 0x10, 0x1acbd}, 0x78) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@bcast, @bcast, @netrom, @bcast, @rose, @default, @bcast]}, &(0x7f0000000080)=0x48, 0x800) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$pptp(r0, &(0x7f0000000400)={0x18, 0x2, {0x0, @loopback}}, 0x1e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x8000, 0x1, 0x3, 0xfffffff8}]}) 08:34:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0xc0045878, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x61, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max.burst\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x29, 0xac, 0x5, 0x80, 0x6, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x7, 0x20, 0x0, 0xff}}) write$cgroup_int(r1, &(0x7f0000000080)=0x4, 0x12) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000dd2f) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000000)={0x0, 0x0}) 08:34:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) eventfd(0x4) 08:34:47 executing program 0: wait4(0x0, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0xffffff36, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x8, 0x12) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x64, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="480000801aff3545e182e95401943ce11f95ab8ab3c26d7fa63d38cebb417ea92f859ff2f6bfcba38fee2729f5ab9fdb2fd5b1c7829da9dd2e028e7a40e6795e3a959bffb4141709e507489e9a7103673ace638d2116eb20e05ce2bc0d7694c640eca99a9aba5e072ab086b538b402f38314dd70dc9a848db39dd85c853a123b11f08919baeb094ae5622072c9742b3d56ea18d337fa93e081f4fd786c1edd0903c0b1e0a0009d7b52517c637d1f9e366de5bd1866de47b01e0afa0ed0f4071cabf21ee9d0fef64c295b56b7e55ad06c9cc96e29e7cd9cee49faac68ea5a817c6472b36aa8ed6eb4ffa7f90c78b49775b778bc857b", @ANYRES16=r2, @ANYBLOB="080028bd7000ffdbdf250c000000050033000000000005002f00010000000a000900aaaaaaaaaaaa0000050033000200000008002b002000000008003c0005000000"], 0x48}, 0x1, 0x0, 0x0, 0x20004880}, 0x4000) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000400), 0x14100, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @rand_addr=0x64010102}}, 0x1e) 08:34:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0xc0045878, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x16000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) 08:34:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:47 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x1000000000000000, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x8, &(0x7f0000000240)={0x0, 0x0}) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@bcast, @default, @default, @bcast, @bcast, @bcast, @bcast, @default]}, &(0x7f0000000080)=0x48, 0x80000) 08:34:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0xc0189436, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:48 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00022dbd7000fed9df2500000000080009000400000005000400000000000600030003000000080019000a01010114002000fe80000000000000000000004bb3e78da85748830000001a00000c00000000000c001000000000000000000005001200c400000006001c00a4da0000"], 0x6c}, 0x1, 0x0, 0x0, 0x20004004}, 0x8045000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:48 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/231, 0xe7, 0x1, &(0x7f00000001c0)=""/102, 0x66}, &(0x7f00000002c0)=0x40) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000000)={0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x402) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x8, 0x0, 0x81, 0x3}, {0x6, 0x5, 0x9, 0xfe8e}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000080)={0x7ca1, 0x0, 'client0\x00', 0xffffffff00000007, "e447357061257ed9", "2cccc127e3a749a20e2785453f1ed06b346b6156423c6b4370a1fd63c4386f34", 0xc2, 0x344a}) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x70, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) 08:34:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0xc020660b, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:48 executing program 5: r0 = socket(0x26, 0x5, 0xeea7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000002b80)={0x67446698, 0x1, 0x3, 0x1, 0x2, "650ce2be44339f389901f0ae10968da52152e018bfb33e1123cd36ea831e52a27544fddc3ec0dc9a555eaed8750cd7d3bc9795671852ae145f583dbcbfe2fe6479269a910b9f05c74d6ed329b60a7c2e"}, 0x60) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@bcast, @netrom, @default, @null, @bcast, @netrom, @bcast, @netrom]}, &(0x7f0000000040)=0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x1, @multicast2}}, 0x21) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x74, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89b1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) recvfrom$netrom(r0, &(0x7f0000000040)=""/143, 0x8f, 0x14040, &(0x7f0000000100)={{0x3, @bcast}, [@default, @null, @null, @default, @default, @default, @default, @bcast]}, 0x48) 08:34:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000340)=0x0, &(0x7f0000000380)=0x4) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl2\x00', r5, 0x2f, 0x3, 0x8, 0xde5a, 0xb, @dev={0xfe, 0x80, '\x00', 0xf}, @local, 0x80, 0x87, 0xfffffe91, 0x4}}) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000300)=0x3f, 0x4) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) 08:34:48 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x8, &(0x7f0000000240)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0xa, &(0x7f0000000180)=[{0x3, 0x6, 0xff, 0xe}, {0x98, 0x4, 0x4, 0x200}, {0x1000, 0x9, 0xac, 0x2779}, {0x3, 0x40, 0x4, 0xc799}, {0x8, 0x3, 0x9}, {0x5, 0x5, 0x5, 0x8}, {0x5, 0x8, 0xfc, 0x7}, {0x0, 0x8, 0x0, 0x1}, {0x6, 0xff, 0x7, 0x3f}, {0x2, 0xfc, 0xa, 0x4}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000280)=r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000000)) 08:34:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) 08:34:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f0000000380)) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8081}, 0x20004010) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0xfff7, 0x40, 0x12, 0x17c1}, {0x3, 0x81, 0xc0, 0x1}, {0xffff, 0x0, 0x0, 0x1}, {0x6, 0x1f, 0x6, 0x9}, {0x0, 0x1, 0x81, 0x5db1}, {0x5, 0x20, 0x3, 0x7}, {0x5, 0x9, 0x9, 0x6}, {0x3, 0xe0, 0x3, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0xa, &(0x7f00000001c0)=[{0xffff, 0x0, 0x1, 0xa6be}, {0x7e8, 0x10, 0x0, 0x10000}, {0x4, 0x5, 0x4, 0x7ff}, {0x4, 0xdf, 0x5, 0x3}, {0x2, 0x8, 0x1, 0x7ff}, {0x1, 0x7, 0x9, 0x9}, {0x9, 0x4, 0x1f, 0xfffffffb}, {0x3, 0x3, 0x1f, 0xff}, {0xb3, 0x5, 0x1, 0x40}, {0xfffa, 0x2, 0x2}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000140)={{0x0, 0x5}, {0x3}, 0x35, 0x4, 0xff}) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x84, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macvlan1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = socket$netlink(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x13, 0x4) 08:34:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x7) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x87, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = gettid() waitid(0x1, r0, &(0x7f0000000b00), 0x4, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/115, 0x73}, {&(0x7f0000000140)=""/10, 0xa}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/157, 0x9d}], 0x6, &(0x7f0000000440)=""/254, 0xfe}, 0x40000061) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r2 = getpgid(r0) syz_open_procfs$namespace(r2, &(0x7f00000005c0)='ns/time_for_children\x00') 08:34:49 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x2f, 0x7, 0x1, @local, @empty, 0x40, 0x7, 0x4, 0x624}}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000300)=0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 08:34:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r2) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x1c, r1, 0x2, 0x60bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x890) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x90, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0xfffffffffffffe1e, 0x0}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x400, 0x20, 0xff, 0x2}, {0x8, 0xa5, 0x5, 0x1}, {0x6, 0x7f, 0x40, 0x7f}]}) r1 = socket$netlink(0x10, 0x3, 0x5) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000280)={0x0, 0x74673cc3ffa59d8a, r1, 0xffffffff, 0x80000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd16ef49def57b882}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="4000000007b92a634fad4b752aabc00d85b3c2743c75124e96ab88f400899a53e7e7cad7c2e2a9b106092c0da52225e5e51bd7f86f6ae1c0cc5c3d71317aef1896c8f88ce150f9c90bae63d2b4c393415dfaaf2f5b61ead565d619ae5c7050bd86110e849d19519a898ba3c376937a587e913594c2b33085774f4c30efc4f9756ffc98e09f9cdf67364e0b58a116979d85deba2ea6872f6a71b9643c0cf39237cec3ac8f7b0fb49dd4b75421335627a506fba2c6927ba340c562f669d108f696353a27", @ANYRES16=0x0, @ANYBLOB="00012abd7000fbdbdf250700000014001f00fc00000000000000000000000000000008000a000000000005000d00010000000500220000000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000840}, 0x4040840) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f00000002c0)={{0x6, 0x81}, 0x0, 0x5, 0xfffffe01, {0x6, 0x81}, 0xb4, 0x1}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000001640)=0x2, 0x8) 08:34:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x400448c9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:49 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000580)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/104, 0x68}, {&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000140)=""/220, 0xdc}, {&(0x7f0000000280)=""/128, 0x80}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000400)=""/167, 0xa7}], 0x6, &(0x7f0000000540)=""/52, 0x34}, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000640)={r2, 0x40, 0x7e37}) 08:34:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000300), r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x400448dd, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x94, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x8, &(0x7f0000000000)={0x0, 0x0}) 08:34:49 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000040)={0x3b, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={0x0, 0x4, 0x5}) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9c, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SOUND_MIXER_READ_RECMASK(0xffffffffffffffff, 0x80044dfd, &(0x7f0000000000)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x9, 0x5}, {0x1, 0x5}, 0x40, 0x4}) r1 = gettid() waitid(0x1, r1, &(0x7f0000000b00), 0x4, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/net\x00') 08:34:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x400454ca, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000024bd7000fbdbdf250100000005000d00000000001400202b873e01195e8d461907801cbb346100ff01000000000000000000000000000106001d000200000005001400ff00000006000e00d71f0000"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000480)='sit0\x00') ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xffff}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40010) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 08:34:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0xfffffffffffffe4e, 0x0}) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:49 executing program 5: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000240)={0x0, 0x0}) 08:34:49 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r2, 0x0, 0x0, 0x20, 0x0, 0x0) io_submit(r1, 0x2, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x770, r0, &(0x7f0000000040)="f3141678353badf0762d678f43ca5506e044c724278969b0058bb4731212ed038b1970e51f821476e7425fe1dbea531afea354ea3a1c2b65f8941f140f560ab712aae705bab51d91810b6064722bd81599a18585fe042157063296ba4bb43c00f09b6276d6aac3fc70b90e993da26a66062082974c6f72ed143d2f9cdd8c43c66e4f", 0x82, 0x5, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0xb3ec, r2, &(0x7f0000000140)="ae9d7bc96448e7f73414a9a5eb4c2bdec1a3c4c049e234635f9441", 0x1b, 0x8, 0x0, 0x2}]) socket$inet_udplite(0x2, 0x2, 0x88) 08:34:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x40049409, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = memfd_create(&(0x7f0000000000)='\x9f&*!.]}^!$-\xd9\x00', 0x2) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r0, 0x0, 0x10000, 0x1000}) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa4, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x6, 0x4, 0xff, 0x7f}, {0x8, 0x5, 0xe0, 0x4}, {0xff, 0x9, 0x4, 0x2}, {0x9, 0x81, 0x0, 0x7fff}, {0x9, 0x3, 0x4, 0x3}]}) 08:34:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, 0x0, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x40086602, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="41410c00f0ffffffc7a166dcd666821ff0140d11820b5bd8e22968802962b951d5edc192e3975e5b7e62907870b45210390908080a98acff90f22cd05b9dbd697e2303ec89bea07e47499de459841ab2ef2623e196a500daea9bc6e6a730c4fafea0c6d5dede12a9a5675c615f58b6bd25311ea1207b4d9dea5197e1f857ee98edc3393cd568d9fa310f37af103125f683226ed05948415cf1c7d8a3b502574930ba930a3f8c13feda1ee44e453fd7316340bd9055aecb1995a382d20a5b"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xd3, &(0x7f0000000080)=""/211, 0x41000, 0x1a, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xf, 0xfffffffe, 0x1}, 0x10}, 0x78) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000003c0)={0x1, 0x2, 'client1\x00', 0x0, "29a4c885c6c07cf2", "c3384bd6b7a13ea707e29624c769af4e2c69d8d1599ef85c6e2ea98695be29b9", 0x8, 0x93}) 08:34:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xac, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:50 executing program 5: ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x4, &(0x7f0000000000)={0xffffffffffffff02, 0x0}) 08:34:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="48100000", @ANYRES16=0x0, @ANYBLOB="000028bd7000fbdbdf250100000005000d000000000014002000ff01000000000000000000000000000106001d000200000005001400ff00000006000e00d71f0000"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000300)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x8000, 0x10, 0x81, 0x9}}) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) getsockopt$PNPIPE_IFINDEX(r5, 0x113, 0x2, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x4) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x42000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xa, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000008000000000000008100000002867700000000001800000001000000000000004000000018220000", @ANYRES32=r1, @ANYBLOB="00000000feffffff180000006b00000000000000860bf7a07ac02b9500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x3, 0xd3, &(0x7f00000003c0)=""/211, 0x41100, 0x10, '\x00', r7, 0x2, r8, 0x8, &(0x7f0000000580)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x7, 0x5, 0x6}, 0x10, 0xffffffffffffffff, r2}, 0x78) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x40186366, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010028bd7000ffdbdf250700000006000e008100000014002000ff02000000000000000000000000000114002000fe80000000bb08000b000200000005001400020000000600030008000000050012000800"/94], 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x44) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x16001, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x14000200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x60, r4, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xf6}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r5}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2d66}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c081}, 0x40041) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r6, 0x80044d13, &(0x7f0000000480)) 08:34:50 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000040)={0x0, 0x2, r1, 0x7}) 08:34:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, &(0x7f0000000000)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x2f, 0x9, 0x0, 0x1f, 0x18, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0x1, 0x3}}) 08:34:50 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getrule={0x1c, 0x22, 0x1, 0x70bd27, 0x25dfdbfd, {0xa, 0x20, 0x80, 0x1f, 0x9, 0x0, 0x0, 0x6}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x810) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb1, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x401c5820, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), r2) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:50 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x1, 0xffffffffffffffff, 0x1}) 08:34:50 executing program 5: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socket$netlink(0x10, 0x3, 0x12) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc0, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0xc, &(0x7f0000000240)={0x0, 0x0}) 08:34:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000300)={r3, 0x1, r1, 0x8, 0x80000}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000140)=0x80) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0xcd, 0x1f, 0x6, 0x22, @loopback, @remote, 0x1, 0x1, 0x1, 0x7f}}) getpeername$netrom(r0, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @bcast, @rose, @rose, @null, @default, @rose, @default]}, &(0x7f0000000100)=0x48) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x300, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0xa, &(0x7f0000000240)={0x0, 0x0}) 08:34:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x80086301, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000028bd7000fbdbdf250100000005000d000000000014002000ff01000000000000000000000000000186001d000200000005001400ff00000006000e00d71f000027ec5f3176629f69541920c672"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000300)=0x62c7, 0x8) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xc, &(0x7f0000000240)={0x0, 0x0}) 08:34:51 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x101, 0x434, 0x6, 0x0, 0xe97, 0x1, 0x5, 0x5}, &(0x7f0000000040)={0xf8a, 0xf2f7, 0x3, 0x1, 0x80, 0x9, 0x3, 0x3ff}, &(0x7f0000000080)={0x1e7, 0xffffffff, 0x5, 0x100, 0x9a, 0x81, 0x100, 0x5}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x100]}, 0x8}) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x500, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x8, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) 08:34:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x80086601, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:51 executing program 4: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x44, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}]}, 0x44}, 0x1, 0x0, 0x0, 0xc094}, 0x20040801) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x8010) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, 0x0, 0x802, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4010}, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x4001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:34:51 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x2b}}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)={0x0}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={r2, 0x2, r3, 0x8}) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x600, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x801c581f, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r2, 0x89f4, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x0, 0xff, 0xa5, 0x4, 0x38, @private1, @loopback, 0x8000, 0x8, 0x3, 0x100}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'syztnl2\x00', r3, 0x2f, 0x7f, 0x8, 0x4, 0x30, @mcast1, @mcast2, 0x8000, 0x7800, 0x2, 0x401}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000040)={0xfffffff2, 0x0}) 08:34:51 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000200)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x7ff, 0x8b, 0x4, 0x20e}, {0x8, 0x3, 0x9, 0x11eb}, {0x400, 0x5, 0xf7, 0xff}, {0x82, 0x0, 0x0, 0x7ff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x2, 0x9, 0x0, 0x6}, {0x0, 0x1, 0x1, 0x3}, {0x101, 0x8, 0x0, 0x4}, {0xff, 0x3, 0x7, 0x3}, {0x1, 0xd, 0x1, 0x80000000}, {0x81, 0x0, 0xb3, 0x7ff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000080)=r3) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x700, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0xa, &(0x7f0000000040)={0x0, 0x0}) 08:34:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r5, 0x103, 0x3, &(0x7f0000000340)=0x5, &(0x7f0000000380)=0x4) 08:34:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, &(0x7f0000000000)={0xfc75, 0x0}) 08:34:51 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={r1, 0x8, 0x5}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r2, 0x7359, 0x5}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x301400, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000200)={0x9, 0x8}) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x900, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:51 executing program 0: accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e22, 0x2df, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x16}}, 0x0, 0x0, 0x1d, 0x0, "d92bbaa62f389086812e32703cdb0fb8e90eabbee01c534c7d19bd9c8ba5c89a32b6e5561ac980b42b53ed60e9334753760689caeb43ad78fb6477ca3f4f26e576cf4ab561d8ae7261c5119e30b09969"}, 0xd8) 08:34:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000000)={0xb9442008bbfef3e7, 0x0}) 08:34:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000028bd7000fbdbdf250100000005000d000000000014002000ff01000000000000000000000000000106001d000200000005001400ff00000006000e00d71f0000"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc00, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:51 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x10100, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0x9, 0x81, 0x0, @mcast1, @local, 0x80, 0x7, 0x0, 0x8001}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, &(0x7f0000000240)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3c}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 08:34:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000040)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000), 0x2) io_setup(0x8, &(0x7f0000000180)=0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x100, r1, &(0x7f0000000080)="efdf17e2124f78559a6a9283e6bf1ddc74c6726ec8298fb6c747ec6cce96c2262d5137c1dfdab99113ce595a266eb570c82cfc", 0x33, 0x6, 0x0, 0x3}, &(0x7f00000001c0)) 08:34:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f00000001c0)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000180)='./file0\x00', r0}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x70, 0x0, 0x108, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfd}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3ff}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000040) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/126, 0x7e, 0x1, &(0x7f00000000c0)=""/23, 0x17}, &(0x7f0000000140)=0x40) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x242082, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000800}, 0x20004084) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r2, 0x89f4, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', r5, 0x29, 0x2, 0xcb, 0x81, 0x18, @private1, @remote, 0x20, 0x7800, 0xd5, 0x40}}) 08:34:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x3d, 0x400, 0x40, @mcast1, @private2, 0x7800, 0x7800, 0x1, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', r3, 0x2f, 0x4, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x29, 0x5, 0x7, 0x9, 0x21, @private1, @rand_addr=' \x01\x00', 0x7800, 0x8000, 0xffffffff, 0x69b1}}) 08:34:52 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x6, 0x8, 0x8001, 0x20, @empty, @loopback, 0x7, 0x700, 0x9, 0x2}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x2f, 0x0, 0x40, 0x6a3e, 0xc, @dev={0xfe, 0x80, '\x00', 0xe}, @mcast1, 0x40, 0x7800, 0xe16, 0x5}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 08:34:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc020660b, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xe00, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:52 executing program 4: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}]}, 0x60}, 0x1, 0x0, 0x0, 0x4050840}, 0x20000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) 08:34:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) io_pgetevents(0x0, 0xffff, 0x9, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000440), 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 08:34:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1400, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x8, 0x8) 08:34:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, &(0x7f0000000000)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) 08:34:52 executing program 0: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x2c, 0x0}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x1, 0x9, 0x3, 0x4}, {0x3, 0x2, 0x4, 0x3ff}, {0x4, 0x7f, 0xc4, 0x2}, {0x8, 0x3f, 0x0, 0x20}, {0x2, 0x8, 0x1, 0x4}, {0xfc00, 0x0, 0xf7, 0x80000000}, {0x4a3d, 0x9, 0xa6, 0x3}, {0xff, 0x9, 0x1, 0x8cf7}, {0x1000, 0xdb, 0x81, 0x17}]}) eventfd(0x7fff) 08:34:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x480000, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x1000, &(0x7f0000000400)=0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1fd7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x1c5900, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r4, 0x80044dfb, &(0x7f0000000340)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r5) 08:34:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1500, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000000)={0x4d, 0x0}) 08:34:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 08:34:52 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x163382, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d0b, &(0x7f0000000080)=0x56) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) 08:34:52 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r1) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000600)=0x0, &(0x7f0000000640)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@ipmr_newroute={0x2c, 0x18, 0x200, 0x70bd2d, 0x25dfdbfb, {0x80, 0x80, 0x10, 0x0, 0x0, 0x2, 0x0, 0xb, 0x2300}, [@RTA_IIF={0x8, 0x3, r2}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x27}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200048c0}, 0x40040) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x4, 0x7f, 0x7, 0x7, 0x5, @local, @remote, 0x1, 0x700, 0x0, 0x1}}) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1600, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) 08:34:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x212041, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x29}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x6, 0x80, 0x2800, 0x42, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x7, 0x10, 0x81, 0x9}}) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) 08:34:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, &(0x7f0000000240)={0x0, 0x0}) [ 2728.873587][ T7049] [ 2728.875946][ T7049] ============================================ [ 2728.882101][ T7049] WARNING: possible recursive locking detected [ 2728.888248][ T7049] 5.15.0-rc6-next-20211022-syzkaller #0 Not tainted [ 2728.894836][ T7049] -------------------------------------------- [ 2728.900984][ T7049] syz-executor.0/7049 is trying to acquire lock: [ 2728.907311][ T7049] ffff888021d409c8 (&mixer->reg_mutex){+.+.}-{3:3}, at: snd_mixer_oss_ioctl1+0x630/0x19a0 [ 2728.917254][ T7049] 08:34:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0xfffffffffffffd90, 0x0}) 08:34:53 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000080)=r1) [ 2728.917254][ T7049] but task is already holding lock: [ 2728.924627][ T7049] ffff888021d409c8 (&mixer->reg_mutex){+.+.}-{3:3}, at: snd_mixer_oss_ioctl1+0x4b1/0x19a0 [ 2728.934741][ T7049] [ 2728.934741][ T7049] other info that might help us debug this: [ 2728.942888][ T7049] Possible unsafe locking scenario: [ 2728.942888][ T7049] [ 2728.950336][ T7049] CPU0 [ 2728.953626][ T7049] ---- [ 2728.956908][ T7049] lock(&mixer->reg_mutex); [ 2728.961514][ T7049] lock(&mixer->reg_mutex); [ 2728.966116][ T7049] [ 2728.966116][ T7049] *** DEADLOCK *** [ 2728.966116][ T7049] 08:34:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 08:34:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 2728.974255][ T7049] May be due to missing lock nesting notation [ 2728.974255][ T7049] [ 2728.982573][ T7049] 1 lock held by syz-executor.0/7049: [ 2728.987949][ T7049] #0: ffff888021d409c8 (&mixer->reg_mutex){+.+.}-{3:3}, at: snd_mixer_oss_ioctl1+0x4b1/0x19a0 [ 2728.998333][ T7049] [ 2728.998333][ T7049] stack backtrace: [ 2729.004403][ T7049] CPU: 0 PID: 7049 Comm: syz-executor.0 Not tainted 5.15.0-rc6-next-20211022-syzkaller #0 [ 2729.014300][ T7049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:34:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 2729.024460][ T7049] Call Trace: [ 2729.027748][ T7049] [ 2729.030706][ T7049] dump_stack_lvl+0xcd/0x134 [ 2729.035319][ T7049] __lock_acquire.cold+0x149/0x3ab [ 2729.040567][ T7049] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2729.046571][ T7049] lock_acquire+0x1ab/0x510 [ 2729.051092][ T7049] ? snd_mixer_oss_ioctl1+0x630/0x19a0 [ 2729.056572][ T7049] ? lock_release+0x720/0x720 [ 2729.061271][ T7049] __mutex_lock+0x12f/0x12f0 [ 2729.065876][ T7049] ? snd_mixer_oss_ioctl1+0x630/0x19a0 08:34:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 2729.071352][ T7049] ? snd_mixer_oss_ioctl1+0x630/0x19a0 [ 2729.076827][ T7049] ? mutex_lock_io_nested+0x1150/0x1150 [ 2729.082412][ T7049] ? __might_fault+0xd1/0x170 [ 2729.087112][ T7049] snd_mixer_oss_ioctl1+0x630/0x19a0 [ 2729.092410][ T7049] ? snd_mixer_oss_conv1.isra.0+0x130/0x130 [ 2729.098319][ T7049] ? lock_downgrade+0x6e0/0x6e0 [ 2729.103215][ T7049] ? __fget_files+0x23d/0x3e0 [ 2729.107913][ T7049] snd_mixer_oss_ioctl+0x40/0x50 [ 2729.112978][ T7049] ? snd_mixer_oss_ioctl_compat+0x60/0x60 [ 2729.118724][ T7049] __x64_sys_ioctl+0x193/0x200 08:34:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c00, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{}, {0x6}]}) [ 2729.123512][ T7049] do_syscall_64+0x35/0xb0 [ 2729.127949][ T7049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2729.133861][ T7049] RIP: 0033:0x7f47491caa39 [ 2729.138285][ T7049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2729.157996][ T7049] RSP: 002b:00007f4746740188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2729.166420][ T7049] RAX: ffffffffffffffda RBX: 00007f47492cdf60 RCX: 00007f47491caa39 [ 2729.174404][ T7049] RDX: 0000000020000080 RSI: 00000000c0044d0b RDI: 0000000000000003 [ 2729.182383][ T7049] RBP: 00007f4749224e8f R08: 0000000000000000 R09: 0000000000000000 [ 2729.190362][ T7049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2729.198347][ T7049] R13: 00007ffd403a9c5f R14: 00007f4746740300 R15: 0000000000022000 [ 2729.206355][ T7049]